Composite key management for ad hoc networks

TitleComposite key management for ad hoc networks
Publication TypeConference Articles
Year of Publication2004
AuthorsYi, S., and R. Kravets
Conference NameMobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on
Date PublishedAug.
Keywordsad hoc networks, authentication, certificate chaining, certification, composite key management, message authentication, mobility management (mobile radio), network security, public key cryptography ad hoc network, public key infrastructure, trusted third party
AbstractWe present composite key management, a novel paradigm for key management in ad hoc networks. While most existing approaches try to fit techniques developed for wired environments into ad hoc networks, our approach works within the specific limitations of ad hoc networks to increase security and availability of the key management framework. By composing techniques from PKI and certificate chaining, composite key management follows two fundamental principles that must be satisfied by an ad hoc key management framework: node participation and the use of a trusted third party. We introduce enhanced metrics of authentication to aid end users in understanding and using the key management framework. Through simulation studies, we demonstrate the effectiveness of composite key management under stressful scenarios where previous approaches fail and show that composite key management can address the challenges posed by the unique nature of ad hoc networks.
Full Text


PDF151.09 KB