Abstract
Key management is important to security of Mobile Ad Hoc NETwork (MANET). Based on the (t, n) threshold cryptography, this paper introduced mobile agent to exchange private key and network topological information with nodes in the network. This method can not only reduce the network overload, but also improve the service velocity and success ratio of authentication. Any t nodes in the network sized n can cooperate to perform an authentication upon a new node wanting to join the network. Carrying private key and some state variables such as survival time, mobile agent navigated in the network according to visits-balance policy, namely, node with the least visits would be first visited by mobile agent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ramanathan, R., Jason, R.: A brief overview of mobile Ad Hoc networks: Challenges and Directions. IEEE Communications Magazine 50th anniversary commemoratives issue, 20–26 (2002-2005)
Buttyan, L., Hubaux, J.P.: Report on a working session on security inwireless Ad Hoc networks. MobileComputing and Communications Review 7(1), 74–94 (2003)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Networks Special Issue on Network Security 13(6), 24–30 (1999)
Kong, J., Zerfos, P., et al.: Providing robust and ubiquitous security support for mobile Ad-Hoc networks. In: IEEE 9th International Conference on Network Protocols (ICNP 2001), Riverside, California (2001)
Pham, V.A., Karmouch, A.: Mobile Software Agents: An Overview. IEEE Communication Magazine, 15–28 (2002-2007)
Yi, S., Kravers, R.: Practical PKI for ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002- 2273, UILU-ENG-2002-1717.Department of Computer Science, University of Illinois at Urbana- Champaign, Urbana, IL
Di Caro, G., Dorigo, M.: Mobile agents for adaptive routing. In: Proceedings of the 31st Hawaii International Conference on Systems, pp. 88–103 (2001)
Fall, K., Varadhan, K.: Ns notes and documentation. The VINT Project, UC Berkeley, LBL,USC/ISI, and Xerox PARC (1999-2007), http://www-mash.cs.berkeley.edu/ns/
Yi, S., Kravets, R.: MOCA: Mobile certificate authentication for wireless Ad Hoc Networks. In: Proc of 2nd Annual PKI Research Workshop Program (PKI 2003), Gaithersburg, Maryland, pp. 65–79 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sharma, A., Agarwal, N., Roy, S., Sharma, A., sharma, P. (2011). Implementing Key Management for Security in Ad Hoc Network. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_66
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_66
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)