Dynamic ad hoc networks and associated key management

Access Full Text

Dynamic ad hoc networks and associated key management

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Dynamic Ad-Hoc Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Author(s): Chi-Yuan Chen 1 ; Kai-Di Chang 2 ; Fan-Hsun Tseng 3 ; Shih-Wen Hsu 4 ; Han-Chieh Chao 1
View affiliations
Source: Dynamic Ad-Hoc Networks,2013
Publication date June 2013

Dynamic ad hoc networks (DANETs) are similar to mobile ad hoc networks (MANETs), but the network density and mobility change significantly over time and space. Many researchers have proposed types of key management schemes for ad hoc networks. In this chapter, we provide a timely survey of the existing solutions and describe the state-of-the-art techniques for DANETs security key management, where we particularly consider those more suitable for DANET. Following a brief discussion on the limitations and challenges of key management in DANET, we introduce the main and desirable features and evaluation metrics of key management. Then a categorization of existing key management systems is presented. Finally, we conclude this chapter with a summary of further developments.

Chapter Contents:

  • 1.1 Introduction
  • 1.1.1 Dynamic ad hoc networks
  • 1.1.2 Challenges of key management
  • 1.2 Background
  • 1.2.1 Desirable features for DANETs
  • 1.2.1.1 Infrastructure-less and distributed architecture
  • 1.2.1.2 Network topology and density
  • 1.2.1.3 Network formation
  • 1.2.1.4 Resource limitations
  • 1.2.1.5 Node mobility
  • 1.2.1.6 Inherent security problems
  • 1.2.2 Evaluation metrics of key management
  • 1.2.2.1 Applicability
  • 1.2.2.2 Complexity
  • 1.2.2.3 Robustness
  • 1.2.2.4 Scalability
  • 1.2.2.5 Security
  • 1.3 Categories of key management schemes
  • 1.3.1 Contributory key management schemes
  • 1.3.2 Distributive key management schemes
  • 1.3.2.1 Public key schemes
  • 1.3.2.2 Symmetric schemes
  • 1.4 Further developments
  • 1.5 Conclusion
  • References

Inspec keywords: telecommunication security; mobile ad hoc networks; mobility management (mobile radio)

Other keywords: MANET; network density; security key management; dynamic ad hoc networks; DANET; mobile ad hoc networks

Subjects: Mobile radio systems; Network management

Preview this chapter:
Zoom in
Zoomout

Dynamic ad hoc networks and associated key management, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte059e/PBTE059E_ch1-1.gif /docserver/preview/fulltext/books/te/pbte059e/PBTE059E_ch1-2.gif

Related content

content/books/10.1049/pbte059e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading