Skip to main content
Top

2013 | OriginalPaper | Chapter

Freshness Preserving Hierarchical Key Agreement Protocol Over Hierarchical MANETs

Author : Hyunsung Kim

Published in: Multimedia and Ubiquitous Engineering

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, Guo et al. proposed an efficient and non-interactive hierarchical key agreement protocol applicable to mobile ad-hoc networks, which is a try to solve the open question: How can secrets be established if an adversary can eavesdrop on every message exchange? However, their protocol does not support freshness of the established session key that key agreement protocols should have. Thereby, we propose a freshness preserving hierarchical key agreement protocol over the hierarchical MANETs. Compared with other existing protocols, the proposed protocol offers much better performance on the bandwidth consumption, the computational cost, and the storage cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Conti M, Giordano S (2007) Multihop ad hoc networking: the theory. J IEEE Commun Mag 45(4):78–86CrossRef Conti M, Giordano S (2007) Multihop ad hoc networking: the theory. J IEEE Commun Mag 45(4):78–86CrossRef
2.
go back to reference Gopalakrishnan K, Uthariaraj VR (2012) Collaborative polling based routing security scheme to mitigate the colluding misbehaving nodes in mobile ad hoc networks. Wireless Pers Commun 67:829–857CrossRef Gopalakrishnan K, Uthariaraj VR (2012) Collaborative polling based routing security scheme to mitigate the colluding misbehaving nodes in mobile ad hoc networks. Wireless Pers Commun 67:829–857CrossRef
3.
go back to reference Dutta R, Dowling T (2011) Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks. Ad Hoc Netw 9:767–787CrossRef Dutta R, Dowling T (2011) Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks. Ad Hoc Netw 9:767–787CrossRef
4.
go back to reference Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun 11(1):38–47CrossRef Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun 11(1):38–47CrossRef
5.
go back to reference Anjum F, Mouchtaris P (2007) Security for wireless ad hoc networks. Wiley, Hoboken Anjum F, Mouchtaris P (2007) Security for wireless ad hoc networks. Wiley, Hoboken
7.
8.
go back to reference Sakai R, Ohgishi K, Kasahara M (2000) Cryptosystems based on Pairings. In: Proceedings of the symposium on cryptography and information security 2000 Sakai R, Ohgishi K, Kasahara M (2000) Cryptosystems based on Pairings. In: Proceedings of the symposium on cryptography and information security 2000
9.
go back to reference Guo H, Mu Y, Lin Z, Zhang X (2011) An efficient and non-interactive hierarchical key agreement protocol. Comput Secur 30:28–34CrossRef Guo H, Mu Y, Lin Z, Zhang X (2011) An efficient and non-interactive hierarchical key agreement protocol. Comput Secur 30:28–34CrossRef
10.
go back to reference Kim H (2011) Location-based authentication protocol for first cognitive radio networking standard. J Netw Comput Appl 34:1160–1167CrossRef Kim H (2011) Location-based authentication protocol for first cognitive radio networking standard. J Netw Comput Appl 34:1160–1167CrossRef
Metadata
Title
Freshness Preserving Hierarchical Key Agreement Protocol Over Hierarchical MANETs
Author
Hyunsung Kim
Copyright Year
2013
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6738-6_114