The key management scheme based on threshold mechanism can provide high security, but the authentication success rate is low and the scalability is poor; the key management scheme based on certificate chain is suitable for the characteristics of ad hoc networks, but its security depends only on the trust of nodes in the certificate chain, which cannot meet the application environment with high security requirements. This paper proposes a hybrid key management and authentication scheme that combines threshold mechanism and certificate chain trust value method. With a small amount of communication volume, the scheme improves the authentication success rate of ad hoc networks and the security of the system, and better balances the security and authentication success rate of ad hoc networks, meeting the security requirements of ad hoc network applications. Keywords Ad hoc networks; certification chain; key management; threshold mechanismA New Hybrid Key Management Scheme for Ad hoc NetworksWANG Hao1,XIE Ying1,ZHENG Wu2(1. College of Automation, Chongqing University of Posts and Telecommunications Nan′an Chongqing 400065; 2. School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 610054)Abstract Key management schemes based on threshold mechanism can provide high security, but lower certificate success rate and bad scalability; key management schemes based on certification chain satisfy self-organized features, but their security depends on trust degree of nodes and could not be applied high security environment. We advance hybrid key management scheme based on threshold mechanism and certification chain. Simulation shows that with less increment of communication overhead, our scheme can improve both certificate success rate and system security and better balances security and availability, and satisfies security needs of Ad hoc networks.Key words Ad hoc; certification chain; key management; threshold mechanism Wireless mobile ad hoc network is a multi-hop wireless network with nodes that can move arbitrarily, highly dynamic topology, and no preset network infrastructure. This wireless network has the characteristics of temporary networking, rapid deployment, no control center, and anti-destruction, and is widely used in military communications and civilian systems. However, due to the characteristics of wireless links, dynamic topology, lack of centralized management, and limited resources of ad hoc networks, it is inherently very fragile and susceptible to various attacks. In addition, traditional security mechanisms are no longer suitable for it, which greatly hinders the application of ad hoc networks, especially in the military field related to national defense security. Key management and authentication of ad hoc networks is one of the core issues in the research of ad hoc network security, and it is also one of the most difficult issues in the research of ad hoc network security. It is the basis for studying secure communication and secure routing in ad hoc networks [1].
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore