By Topic

Strategy and simulation of trust cluster based key management protocol for ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Li Xu ; Key Lab of Network security and Cryptology, Fujian Normal University, Fuzhou, China ; Xiaoding Wang ; Jinbo Shen

Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose a hybrid decentralized key management protocol using the NS3 (New Secret Sharing Scheme) algorithm for ad hoc networks, covering the aspects of key deployment, key refreshment and key establishment. Both theoretical analysis and simulations indicate that the proposed protocol has less complexity and stronger security than some current strategies.

Published in:

Computer Science & Education, 2009. ICCSE '09. 4th International Conference on

Date of Conference:

25-28 July 2009