We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Cluster Based Composite Key Management in Mobile Ad Hoc Networks

by Dr.A.Vincent Antony Kumar, R.PushpaLakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 7
Year of Publication: 2010
Authors: Dr.A.Vincent Antony Kumar, R.PushpaLakshmi
10.5120/836-1026

Dr.A.Vincent Antony Kumar, R.PushpaLakshmi . Cluster Based Composite Key Management in Mobile Ad Hoc Networks. International Journal of Computer Applications. 4, 7 ( July 2010), 30-35. DOI=10.5120/836-1026

@article{ 10.5120/836-1026,
author = { Dr.A.Vincent Antony Kumar, R.PushpaLakshmi },
title = { Cluster Based Composite Key Management in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2010 },
volume = { 4 },
number = { 7 },
month = { July },
year = { 2010 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number7/836-1026/ },
doi = { 10.5120/836-1026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:52:27.731172+05:30
%A Dr.A.Vincent Antony Kumar
%A R.PushpaLakshmi
%T Cluster Based Composite Key Management in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 7
%P 30-35
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network is a wireless network without the support of network infrastructure. Security is one of the main challenge in ad hoc network due to dynamic topology and mobility of nodes. In this paper, we present a new composite key management scheme based on a combination of techniques such as hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. In this method, network is hierarchically structured into clusters based on node’s trust value. The information about node revocation and PKG service nodes are exchanged in the network using mobile agents. The cluster head maintains public keys of its members which overcomes the storage problem in PKI where each node maintains public key of other nodes in network and avoids centralized CA to generate keys, thus enhances security.

References
Index Terms

Computer Science
Information Sciences

Keywords

Composite Key management Certification authority Trust evaluation