Skip to main content

A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4953))

Abstract

A mobile Ad Hoc network is a multi-path autonomous system comprised of many mobile nodes with wireless transmission capability. Although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we first review current research in key management in mobile Ad Hoc networks. Then by considering the characteristics of such networks in which free movement of mobile nodes can lead to frequent topological changes, especially network separation and convergence, we propose an key management mechanism based on a combination of techniques, such as hierarchical topology structure, virtual CA (certification authority), offline CA, certificate chain, and proactive measurement, and show that the proposed scheme could improve the security of mobile ad hoc network in the areas of expandability, validity, fault tolerance and usability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fu, Y., He, J., Li, G.: A Composite Key Management Scheme for Mobile Ad Hoc Networks. In: Proc. OTM Workshops 2006. LNCS, vol. 427, pp. 575–584. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Zhou, L., Haas, Z.J.: Securing Ad Hoc Network. IEEE Networks 13(6), 24–30 (1999)

    Article  Google Scholar 

  3. Yi, S., Kravets, R.: Key Management for Heterogeneous Ad Hoc Wireless Networks. In: Proc. 10th IEEE International Conference on Network Protocols, pp. 202–203 (2002)

    Google Scholar 

  4. Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Network. In: Proc. 2nd Annual PKI Research Workshop (2003)

    Google Scholar 

  5. Hubaux, J.P., Buttyan, L., Capkun, S.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. Transactions on Mobile Computing, 52–64 (2003)

    Google Scholar 

  6. Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: CACM, pp. 146–155 (2001)

    Google Scholar 

  7. Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: Proc. Symp. on Applications and the Internet Workshop, pp. 342–346 (2003)

    Google Scholar 

  8. Zheng, S.R.: The Technique of Ad Hoc Network. Posts & Telecom Press (2004)

    Google Scholar 

  9. Lin, X., Zen, X.: Mobile Ad Hoc Network-Self-Organization Wireless Network Technology. Publishing House of Electronics Industry, Beijing, China (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Geun Sik Jo Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fu, Y., He, J., Luan, L., Li, G., Rong, W. (2008). A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78582-8_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78581-1

  • Online ISBN: 978-3-540-78582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics