2006
DOI: 10.1109/comst.2006.253271
|View full text |Cite
|
Sign up to set email alerts
|

A survey of key management in ad hoc networks

Abstract: Abstract-The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and communication end-points. This makes the network layer more prone to security attacks. A main challenge is to judge whether a routing message originates from a trustworthy node or not. The solution so far is cryptographically signed messages. The general assumption is that nodes are in possession of a valid secret key can be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0
5

Year Published

2008
2008
2016
2016

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 110 publications
(66 citation statements)
references
References 63 publications
0
61
0
5
Order By: Relevance
“…The predistribution of encryption keys in a WSN is the fact of storing these keys in the memory nodes before deployment. In literature, we find several classifications of cryptographic key management systems, such as papers in [12] - [14].…”
Section: Methods and Protocols Classificationmentioning
confidence: 99%
“…The predistribution of encryption keys in a WSN is the fact of storing these keys in the memory nodes before deployment. In literature, we find several classifications of cryptographic key management systems, such as papers in [12] - [14].…”
Section: Methods and Protocols Classificationmentioning
confidence: 99%
“…However, it calculates trust, only based on direct interactions and does not consider indirect trust recommendations from remote nodes. In [11], the authors proposed a survey of key management techniques targeted to only network-layer security. In [12], the authors proposed a framework to mitigate double-face attacks based on collecting both direct and remote recommendations.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…When a new member M joins the group, we place member M in a position such that all ancestors of M will have higher probability and all descendants of M will have lesser probability. [11][12]…”
Section: Our Approachmentioning
confidence: 99%