Research Article

Cluster Based Composite Key Management in Mobile Ad Hoc Networks

by  Dr.A.Vincent Antony Kumar, R.Pushpalakshmi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Issue 7
Published: July 2010
Authors: Dr.A.Vincent Antony Kumar, R.Pushpalakshmi
10.5120/836-1026
PDF

Dr.A.Vincent Antony Kumar, R.Pushpalakshmi . Cluster Based Composite Key Management in Mobile Ad Hoc Networks. International Journal of Computer Applications. 4, 7 (July 2010), 30-35. DOI=10.5120/836-1026

                        @article{ 10.5120/836-1026,
                        author  = { Dr.A.Vincent Antony Kumar,R.Pushpalakshmi },
                        title   = { Cluster Based Composite Key Management in Mobile Ad Hoc Networks },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 4 },
                        number  = { 7 },
                        pages   = { 30-35 },
                        doi     = { 10.5120/836-1026 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Dr.A.Vincent Antony Kumar
                        %A R.Pushpalakshmi
                        %T Cluster Based Composite Key Management in Mobile Ad Hoc Networks%T 
                        %J International Journal of Computer Applications
                        %V 4
                        %N 7
                        %P 30-35
                        %R 10.5120/836-1026
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network is a wireless network without the support of network infrastructure. Security is one of the main challenge in ad hoc network due to dynamic topology and mobility of nodes. In this paper, we present a new composite key management scheme based on a combination of techniques such as hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. In this method, network is hierarchically structured into clusters based on node’s trust value. The information about node revocation and PKG service nodes are exchanged in the network using mobile agents. The cluster head maintains public keys of its members which overcomes the storage problem in PKI where each node maintains public key of other nodes in network and avoids centralized CA to generate keys, thus enhances security.

References
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Composite Key management Certification authority Trust evaluation

Powered by PhDFocusTM