Securing mobile Ad hoc networks: key management and routing

KK Chauhan, AKS Sanger - arXiv preprint arXiv:1205.2432, 2012 - arxiv.org
Secure communication between two nodes in a network depends on reliable key
management systems that generate and distribute keys between communicating nodes and …

Ad hoc networks security

P Michiardi, R Molva - Mobile ad hoc networking, 2004 - Wiley Online Library
In this chapter, we present the recent research that has been done in order to come up with
secure routing protocols for ad hoc networks that cope with threats that are specific to the ad …

A survey of key management in ad hoc networks

AM Hegland, E Winjum, SF Mjolsnes… - … Surveys & Tutorials, 2006 - ieeexplore.ieee.org
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more
vulnerable to security attacks than their wired counterparts. The nodes act both as routers …

An on-demand key establishment protocol for MANETs

K Mounis, M Abdallah… - International Journal of …, 2009 - inderscienceonline.com
Securing ad-hoc networks is a challenging task owing to their specific characteristics. One of
the major challenges is that ad-hoc networks typically lack a fixed infrastructure, both in the …

Security in ad hoc networks

R Molva, P Michiardi - IFIP International Conference on Personal Wireless …, 2003 - Springer
In wirelesss ad hoc networks basic network operations are carried out through the
cooperation of all available nodes. Due to the inherent lack of a managed infrastructure the …

Key management and delayed verification for ad hoc networks

MG Zapata - Journal of High Speed Networks, 2006 - content.iospress.com
This paper proposes a key management scheme for MANET (Mobile Ad hoc NETworks)
networks that uses asymmetric cryptography without requiring nodes to know the public keys …

[PDF][PDF] Routing protocol based key management schemes in manet: a survey

KR Shibu, RS Pramila - International Journal of Engineering & …, 2018 - researchgate.net
Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this
network is always changing. The nodes can enter and leave the network at any time. These …

[PDF][PDF] Attacks against OLSR: Distributed key management for security

C Adjih, D Raffo, P Muhlethaler - 2nd OLSR Interop/Workshop …, 2005 - researchgate.net
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …

[PDF][PDF] Authenticated and efficient key management for wireless ad hoc networks

S Seys, B Preneel - Proceedings of the 24th …, 2003 - securewww.esat.kuleuven.be
In this paper we present a key management protocol for wireless ad hoc multi-hop networks.
Two objectives were crucial in our design:(1) distributed trust to ensure robustness, and (2) …

[HTML][HTML] A lightweight group-key management protocol for secure ad-hoc-network routing

NC Fernandes, OCMB Duarte - Computer Networks, 2011 - Elsevier
Secure routing protocols for ad hoc networks use group keys for authenticating control
messages without high energy consumption. A distributed and robust group-key …