Title :
A cross-layer key management scheme in Ad hoc network
Author :
Zeng Ping ; Hu Ronglei ; Yang Yatao ; Song Jie
Author_Institution :
Dept. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China
Abstract :
Wireless Ad hoc network is vulnerable to various security threats and key management is one important means to solve security problems of Ad hoc network. But the higher the security of key management mechanisms, the easier to consume more energy and network resources. An cross-layer key management model is proposed to resolve the questions due to the shortage of network resources and energy, both think of network security and network performance factors. The constraint conditions of each layer include providing the network performance parameters, network security and network requirements. On the basis of this model, a cross-layer key management scheme is given based on threshold cryptography. In key update process of the scheme, the function of each layer involved in the update was clearly. The algorithms and the exchange of the node to authenticate the complexity may be caused by a decline in network, the network performance would ultimately lead to failure of the key updates or updated key information in an accurate Transmission of information that exist in the high bit error rates. Scheme analysis shows that the scheme is suitable for wireless Ad hoc network.
Keywords :
ad hoc networks; private key cryptography; telecommunication security; cross-layer key management; network security; security threat; threshold cryptography; wireless ad hoc network; Ad hoc networks; Cryptography; Databases; Physical layer; Quality of service; Servers; Ad hoc network; cross-layer key management; threshold cryptography;
Conference_Titel :
Signal Processing Systems (ICSPS), 2010 2nd International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4244-6892-8
Electronic_ISBN :
978-1-4244-6893-5
DOI :
10.1109/ICSPS.2010.5555583