Key Management and Authentication in Ad Hoc Network based on Mobile Agent

作者: Yi Zhang , Lina Zhu , Li Feng

DOI: 10.4304/JNW.4.6.487-494

关键词:

摘要: Key management and authentication is important to security of Mobile Ad Hoc network (MANET). Based on the (t, n) threshold cryptography, this paper introduced mobile agents exchange private key topological information with nodes in network. This method avoids a centralized certification authority distribute public keys certificates, thus enhances security. Carrying some state variables, navigate according visitsbalance policy, namely, node least visits would be first visited by agent. Any t can cooperate perform an upon new wanting join Experimental results show that agent performs very well for improving success ratio enhance while reducing communication overhead resource consumption.

参考文章(8)
Levente Buttyán, Jean-Pierre Hubaux, Srdan Capkun, The quest for security in mobile ad hoc networks mobile ad hoc networking and computing. pp. 146- 155 ,(2001) , 10.1145/501436.501437
Levente Buttyán, Jean-Pierre Hubaux, Report on a working session on security in wireless ad hoc networks ACM SIGMOBILE Mobile Computing and Communications Review. ,vol. 7, pp. 74- 94 ,(2003) , 10.1145/881978.882002
G. Di Caro, M. Dorigo, Mobile agents for adaptive routing hawaii international conference on system sciences. ,vol. 7, pp. 74- 83 ,(1998) , 10.1109/HICSS.1998.649179
Vu Anh Pham, A. Karmouch, Mobile software agents: an overview IEEE Communications Magazine. ,vol. 36, pp. 26- 37 ,(1998) , 10.1109/35.689628
Lidong Zhou, Z.J. Haas, Securing ad hoc networks IEEE Network. ,vol. 13, pp. 24- 30 ,(1999) , 10.1109/65.806983
K. Paul, S. Bandyopadhyay, A. Mukherjee, D. Saha, Communication-aware mobile hosts in ad-hoc wireless network ieee international conference on personal wireless communications. pp. 83- 87 ,(1999) , 10.1109/ICPWC.1999.759590
Jiej, Z. Petros, Haiyun Luo, Songwu Lu, Lixia Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks international conference on network protocols. pp. 251- 260 ,(2001) , 10.1109/ICNP.2001.992905