Abstract
Unlike fixed networks, mobile ad-hoc networks have diverse characteristics, such as dynamic topologies, bandwidth-constrained links, energy-constrained operation, limited physical security, etc. Due to these characteristics their security requirements are different from those of fixed networks. This paper presents a method of authenticating the nodes in the ad-hoc network and securely transmitting information in consideration of the characteristics of the mobile ad hoc network. To this end, this paper proposes a method of combining asymmetric and symmetric cryptography to enhance the efficiency of secret key management for authentication and secure channel establishment. In particular, this paper proposes a method that introduces the concept of Hamming Distance to share the secret keys between the nodes. According to this proposal, secure communication between the nodes is possible when one node manages only log 2 N secret keys.
Chapter PDF
Similar content being viewed by others
References
Hamming, R.: Coding and Information Theory. Prentice-Hall, Englewood Cliffs (1980)
Jain, R.: The art of computer systems performance analysis. John Wiley & Sons, Chichester (1991)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Frankel, Y., Gemmell, P., MacKenzie, P.-D., Yung, M.: Optimal-Resilience Proactive Public-Key Cryptosystems. In: IEEE Symp. on Foundations of Computer Science (1997)
Fokine, K.: Key Management in Ad Hoc Networks. LiTH-ISY-EX-3322-2002 (2002)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)
Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report 200030, UCLA Computer Science Department (Oct. 2000)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for MANET. In: Proc. ninth Int’l conf. Network Protocols (Nov. 2001)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Seventh IEEE Symp. on Computers and Communications (2002)
Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC3280 (April 2002)
Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. on mobile computing 2(1) (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Lee, SL., Jeun, IK., Song, JS. (2007). Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds) Computational Science – ICCS 2007. ICCS 2007. Lecture Notes in Computer Science, vol 4488. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72586-2_96
Download citation
DOI: https://doi.org/10.1007/978-3-540-72586-2_96
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72585-5
Online ISBN: 978-3-540-72586-2
eBook Packages: Computer ScienceComputer Science (R0)