{"title":"基于频率的无线和移动自组织网络安全密钥管理方案:证明和正确性","authors":"A. Boukerche, Yonglin Ren, Samer M. J. Samarah","doi":"10.1109/GLOCOM.2008.ECP.353","DOIUrl":null,"url":null,"abstract":"Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology undergoes frequent changes. This paper presents a novel key management scheme that not only employs both symmetric and asymmetric key algorithms, but also achieves its key updates through a frequency-based approach. In addition, our scheme provides necessary protection for other aspects of key management, such as data confidentiality, key distribution, etc. Through the discussion of the current issues of key management and a further analysis of our key management scheme, our solution is proven to be secure in the process of key management and to be robust against attacks aimed at causing malicious key updates.","PeriodicalId":297815,"journal":{"name":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","volume":"267 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness\",\"authors\":\"A. Boukerche, Yonglin Ren, Samer M. J. Samarah\",\"doi\":\"10.1109/GLOCOM.2008.ECP.353\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology undergoes frequent changes. This paper presents a novel key management scheme that not only employs both symmetric and asymmetric key algorithms, but also achieves its key updates through a frequency-based approach. In addition, our scheme provides necessary protection for other aspects of key management, such as data confidentiality, key distribution, etc. Through the discussion of the current issues of key management and a further analysis of our key management scheme, our solution is proven to be secure in the process of key management and to be robust against attacks aimed at causing malicious key updates.\",\"PeriodicalId\":297815,\"journal\":{\"name\":\"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference\",\"volume\":\"267 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GLOCOM.2008.ECP.353\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.2008.ECP.353","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness
Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology undergoes frequent changes. This paper presents a novel key management scheme that not only employs both symmetric and asymmetric key algorithms, but also achieves its key updates through a frequency-based approach. In addition, our scheme provides necessary protection for other aspects of key management, such as data confidentiality, key distribution, etc. Through the discussion of the current issues of key management and a further analysis of our key management scheme, our solution is proven to be secure in the process of key management and to be robust against attacks aimed at causing malicious key updates.