Title :
Symmetric key management and distribution techniques in wireless ad hoc networks
Author :
Krishna, M. Bala ; Doja, M.N.
Author_Institution :
Sch. of Inf. Technol., G.G.S. Indraprastha Univ., New Delhi, India
Abstract :
In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Trusted Third Party (TPP) or Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave the network. The main feature of security protocols is key management, which includes key distribution and key update. This article gives analysis of various key management and symmetric key distribution techniques in wireless ad hoc network. Master key, pair wise key and random key pre-distribution techniques are used in key management. Analytical methods confirm that for a less dense network master key is used and for a large dense network random key is used. In order to minimize the key management complexity in security protocols, symmetric key distribution is used. Key distribution techniques are classified based node attributes as local area, wide area and threshold area conditions. Analysis of various key distribution method concludes that (i) if keys are compromised in a local area, self-healing key management technique is used (ii) if keys are compromised in wide area, distributed Diffie Hellman is used and (iii) if keys are compromised in threshold area conditions, then subset of m keys are distributed in m different locations.
Keywords :
ad hoc networks; cryptographic protocols; telecommunication security; CA function; TPP function; authentication communication; certificate authority function; distributed Diffie Hellman; network master key; network random key; security protocols; self-healing key management technique; symmetric key distribution techniques; symmetric key management; trusted third party function; wireless ad hoc networks; Encryption; Mobile ad hoc networks; Public key; Servers; Key Distribution; Logical Hierarchy Key and Threshold Key Management; Shared Group Key; Symmetric Key Management;
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2011 International Conference on
Conference_Location :
Gwalior
Print_ISBN :
978-1-4577-2033-8
DOI :
10.1109/CICN.2011.158