By Topic

Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yu, F.R. ; Dept. of Syst. & Comput. Eng., Carleton Univ., Ottawa, ON, Canada ; Tang, H. ; Fei Wang ; Leung, V.C.M.

In mobile ad hoc networks (MANETs), identity (ID)-based cryptography with threshold secret sharing is a popular approach for the key management design. Most previous work for key management in MANETs concentrates on the protocols and structures. How to optimally conduct node selection in ID-based cryptography with threshold secret sharing merits further investigation. In this paper, we propose a distributed scheme to dynamically select nodes with master key shares to provide the private key generation service. The proposed scheme considers the node security and energy states in the process of selecting best nodes to construct a private key generator (PKG). Intrusion detection systems are modeled as noisy sensors to monitor the system security situations. The node selection process is formulated as a stochastic optimization problem. Simulation results are presented to illustrate the effectiveness of the proposed scheme.

Published in:

Computational Science and Engineering, 2009. CSE '09. International Conference on  (Volume:2 )

Date of Conference:

29-31 Aug. 2009