A key management scheme combined with intrusion detection for mobile Ad Hoc networks

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A mobile Ad Hoc network is a multi-path autonomous system comprised of many mobile nodes with wireless transmission capability. Although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we first review current research in key management in mobile Ad Hoc networks. Then by considering the characteristics of such networks in which free movement of mobile nodes can lead to frequent topological changes, especially network separation and convergence, we propose an key management mechanism based on a combination of techniques, such as hierarchical topology structure, virtual CA (certification authority), offline CA, certificate chain, and proactive measurement, and show that the proposed scheme could improve the security of mobile ad hoc network in the areas of expandability, validity, fault tolerance and usability. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Fu, Y., He, J., Luan, L., Li, G., & Rong, W. (2008). A key management scheme combined with intrusion detection for mobile Ad Hoc networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4953 LNAI, pp. 584–593). https://doi.org/10.1007/978-3-540-78582-8_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free