{"title":"A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness","authors":"A. Boukerche, Yonglin Ren, Samer M. J. Samarah","doi":"10.1109/GLOCOM.2008.ECP.353","DOIUrl":null,"url":null,"abstract":"Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology undergoes frequent changes. This paper presents a novel key management scheme that not only employs both symmetric and asymmetric key algorithms, but also achieves its key updates through a frequency-based approach. In addition, our scheme provides necessary protection for other aspects of key management, such as data confidentiality, key distribution, etc. Through the discussion of the current issues of key management and a further analysis of our key management scheme, our solution is proven to be secure in the process of key management and to be robust against attacks aimed at causing malicious key updates.","PeriodicalId":297815,"journal":{"name":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","volume":"267 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.2008.ECP.353","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology undergoes frequent changes. This paper presents a novel key management scheme that not only employs both symmetric and asymmetric key algorithms, but also achieves its key updates through a frequency-based approach. In addition, our scheme provides necessary protection for other aspects of key management, such as data confidentiality, key distribution, etc. Through the discussion of the current issues of key management and a further analysis of our key management scheme, our solution is proven to be secure in the process of key management and to be robust against attacks aimed at causing malicious key updates.