By Topic

A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Boukerche, A. ; Sch. of Inf. Technol. & Eng., Univ. of Ottawa, Ottawa, ON ; Yonglin Ren ; Samarah, S.

Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology undergoes frequent changes. This paper presents a novel key management scheme that not only employs both symmetric and asymmetric key algorithms, but also achieves its key updates through a frequency-based approach. In addition, our scheme provides necessary protection for other aspects of key management, such as data confidentiality, key distribution, etc. Through the discussion of the current issues of key management and a further analysis of our key management scheme, our solution is proven to be secure in the process of key management and to be robust against attacks aimed at causing malicious key updates.

Published in:

Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE

Date of Conference:

Nov. 30 2008-Dec. 4 2008