[PDF][PDF] Post Deployment Secure Key Management in Wireless Ad hoc Networks

P Loree, K Nygard - International Conference on Future …, 2016 - personales.upv.es
Providing secure communication between nodes in mobile ad hoc networks is critical in
many applications. In this paper, we present our work on a key distribution scheme for …

Analysis of different key-distribution schemes for Mobile Ad-hoc NETwork

VB Sanghavi, SV Sanghvi, NV Tada… - 2012 Nirma University …, 2012 - ieeexplore.ieee.org
Due to the characteristics of Mobile Ad-hoc NETwork (MANET) like dynamic infrastructure,
unreliable multi-hop communication channel, node mobility, resource limitation and physical …

Analysis of a hybrid key management solution for ad hoc networks

A Balasubramanian, S Mishra… - IEEE Wireless …, 2005 - ieeexplore.ieee.org
Designing a key management system is both important and challenging for wireless ad hoc
networks. We have developed a secure, scalable, decentralized and robust key …

[PDF][PDF] Efficient Key Management Scheme for Mobile Ad Hoc Network

MC Morogan - 2005 - Citeseer
Secure and efficient key management in mobile ad hoc network has been a challenging task
for the researchers due to some properties of ad hoc network like dynamic topologies, use of …

[PDF][PDF] Hierarchical approach for key management in mobile Ad hoc networks

A Renuka, KC Shet - International Journal of Computer Science and …, 2009 - academia.edu
Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which
communicate with each other by forming a multi-hop radio network and maintaining …

Key distribution in mobile ad hoc networks based on message relaying

J Van Der Merwe, D Dawoud, S McDonald - … and Privacy in Ad-hoc and …, 2007 - Springer
Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of
centralized authority and poor connectivity. A key distribution mechanism is central to any …

Comments on``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004

J Wu, R Wei - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Abstract In IEEE INFOCOM 2004, Chan proposed a distributed key management scheme for
mobile ad hoc networks, and deduced the condition under which the key sets distributed to …

Comments on “Distributed symmetric key management for mobile ad hoc networks”

J Wu, R Wei - Information Processing Letters, 2009 - Elsevier
In IEEE INFOCOM 2004, Chan proposed a distributed key management scheme for mobile
ad hoc networks, and deduced the condition under which the key sets distributed to the …

Identity-based threshold key management for ad hoc networks

Y Zhang, J Liu, Y Wang, J Han… - 2008 IEEE Pacific-Asia …, 2008 - ieeexplore.ieee.org
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no
aid of any established infrastructure, which, however, is commonly susceptible to various …

A survey of key management in ad hoc networks

AM Hegland, E Winjum, SF Mjolsnes… - … Surveys & Tutorials, 2006 - ieeexplore.ieee.org
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more
vulnerable to security attacks than their wired counterparts. The nodes act both as routers …