Abstract
Ensuring security in Mobile Ad-hoc Network is a challenging issue Many emerging applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad hoc network a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in network. Where there may be one or more malicious nodes in between source and destination. Establishing MANET security is entirely different from the traditional methods of providing network security. As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention Securing communications in resource constrained, infrastructure-less environments such as MANETs is very challenging. All cryptographic techniques will be not effective if the key management is weak. The purpose of rekeying management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. In MANETs, A number of key management schemes have been proposed for MANETs. In this paper, we proposea Centralize approach based rekeying management scheme with group management.
Key-Words / Index Term
MANET, Key Management, Centralized approach, Cryptography, Private Key, Rekeying System, Group Management
References
[1]. T. Chiang and Y. Huang. “Group keys and the multicast security in ad hoc networks”. In Proceedings of the 2003 International Conference on Parallel Processing Workshops, 2003.
[2]. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. “Secure multicast groups on ad hoc networks”. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pages 94–102. ACM Press, 2003.
[3]. D.Huang, D.Medhi, “A Secure Group Key Management scheme for Hierarchical Mobile Adhoc Networks”, Adhoc Networks, June 2008.
[4]. Umesh Kumar Singh, ShivlalMewada, Lokesh Laddhani & Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Volume-9, No.4, pp (106-111), April 2011.ISSN: 1947-5500
[5]. N. Kettaf, H. Abouaissa, P. Lorenz, “An Efficient Heterogeneous Key Management approach For Secure Multicast Communication in Ad hoc networks”, Springer, Telecommunication System, vol-37, pp: 29-36 , February 2008
[6]. Thair Khdour and Abdullah Aref, “A HYBRID SCHEMA ZONE-BASED KEY MANAGEMENTFOR MANETS”, Journal of Theoretical and Applied Information Technology, Vol. 35 No.2, 31 January 2012.
[7]. G. Chockler, I. Keidar, and R. Vitenberg. “Group communication speci_cations: A comprehensive study”. ACM Computing Surveys, 33(4), December 2001.
[8]. D. Powell. Group communication. CACM, 39(4), 1996.
[9]. C. Basile, M.-O. Killijian, and D. Powell. “A survey of dependability issues in mobile wireless networks”. Technical report, LAAS CNRS, France, February 2003.
[10]. http://citeseer.nj.nec.com/400961.html.2000.H. Dang, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks”, IEEE Communications Magazine, 0163-6804, pp. 70-75, October 2009.
[11]. Kamal Kumar Chauhan and Amit Kumar Singh Sanger, “Securing Mobile Ad hoc Networks: Key Management and Routing”, International Journal on Ad Hoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012.
[12]. Merin Francis, M. Sangeetha and Dr. A. Sabari, “A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 1, January 2013.
[13]. Mohamed Salah Bouassida, Isabelle Chrisment, and Olivier Festor, “Group Key Management in MANETs”, International Journal of Network Security, Vol.6, No.1, PP.67–79, Jan. 2008.
[14]. S.Rajarajeswari and S.BaghavathiPriya, “An Optimal key Management for MANET”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 1 February 2013.
[15]. Aldar C-F. Chan, Edward S. Rogers, “Distributed Symmetric Key Management for Mobile Ad hoc Networks”, IEEE INFOCOM ,vol.6,issue 1, feruary 2004.
[16]. Manel Guerrero Zapata, “Key management and delayed verification for Ad hoc networks”, Journal of High Speed Networks 15 (2006) 93–109