DocumentCode :
3039298
Title :
Mobile agent based composite key management scheme for MANET
Author :
PushpaLakshmi, R. ; Kumar, A. Vincent Antony ; Rahul, R.
Author_Institution :
Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India
fYear :
2011
fDate :
23-24 March 2011
Firstpage :
964
Lastpage :
969
Abstract :
In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for partitioning network into clusters. The cluster head is elected based on the trust ability of the node. We present a fuzzy logic controller to calculate the trust level of node. Trustworthiness of node is evaluated based on the packet forwarding status of the node. The public key and private key of the cluster head change with respect to it´s trust value. The private key is generated by combining key shares generated by partial key generation serving nodes. Mobile agent is used to share information about serving nodes within the cluster and to collect information about the susceptible nodes in the cluster, used for key revocation process. The system guarantees forward secrecy and backward secrecy, as the key of cluster head changes continuously with respect to it´s trust value.
Keywords :
fuzzy control; mobile ad hoc networks; mobile agents; pattern clustering; private key cryptography; public key cryptography; MANET; fuzzy logic controller; hierarchical clustering; information collection; key revocation process; mobile ad hoc network; mobile agent based composite key management scheme; offline certification authority; packet forwarding status; partial key generation serving node; partitioning network; private key cryptography; public key cryptography; trust ability; Ad hoc networks; Certification; Clustering algorithms; Fuzzy logic; Mobile agents; Public key; Ad hoc network; certification authority; fuzzy controller; hierarchical clustering; key management; mobile agent; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on
Conference_Location :
Tamil Nadu
Print_ISBN :
978-1-4244-7923-8
Type :
conf
DOI :
10.1109/ICETECT.2011.5760259
Filename :
5760259
Link To Document :
بازگشت