Authors: V. Palanisamy, P. Annadurai
Addresses: Department of Computer Science and Engineering, Alagappa University, KaraiKudi, Tamil Nadu, India. ' Computer Science Department, Kanchi Mamunivar Centre for Post Graduate Studies (Autonomous), Lawspet, Puducherry – 605 008, India
Abstract: In wireless and distributed nature of ad hoc networks, security has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. TBCMKDS discussed in this paper addresses the key management issues encountered in ad hoc networks. TBCMKDS is inspired by the control, accessibility and scalability characteristic of cluster architecture in distributed systems. The system builds cluster and spans the entire network with different clusters. The nodes within the cluster select a cluster head using degree of neighbours, node identification and trust, mimicking the human neighbour enquiry model. After a detailed analysis on various existing key management schemes, the proposed scheme freezes with the modified version of web of trust approach. Elliptic curve cryptography (ECC) is used for key pair and certificate generation, since ECC provides higher security with lesser key size.
Keywords: mobile ad hoc networks; MANETs; key management; virtual clusters; routing protocols; trust based clustering; multicast key distribution; network security; distributed systems; elliptic curve cryptography.
International Journal of Internet Protocol Technology, 2011 Vol.6 No.1/2, pp.46 - 64
Available online: 07 Jun 2011 *Full-text access for editors Access for subscribers Purchase this article Comment on this article