会议专题

A Cross-Layer key management scheme in Ad hoc network

Wireless Ad hoc network is vulnerable to various security threats and key management is one important means to solve security problems of Ad hoc network. But the higher the security of key management mechanisms, the easier to consume more energy and network resources. An crosslayer key management model is proposed to resolve the questions due to the sbortage of network resources and energy, both think of network security and network performance factors. The constraint conditions of each layer include providing the network performance parameters, network security and network requirem ents. On the basis of this model, a cross-layer key management scheme is given based on threshold cryptography. In key update process of the scheme, the function of each layer involved in the update was clearly. The algorithms and the exchange of the node to authenticate the complexity may be caused by a decline in network, the network performance would ultimately lead to failure of the key updates or updated key information in an accurate Transmission of information that exist in the high bit error rates. Scheme analysis shows that the scheme is suitable for wireless Ad hoc network.

Ad hoc neNork cross-ltryer key management threshold cryptography

Zeng-Ping Hu-Ronglei Yang-Yatao Song-Jie

Department of Communication Engineering Beijing Electronic Science and Technology Institute Beijing, Department of Communication Engineering Beijing Electronic Science and Technology Institute Beijing,

国际会议

2010 2nd International Conference on Signal Processing System(2010年信号处理系统国际会议 ICSPS 2010)

大连

英文

132-137

2010-07-05(万方平台首次上网日期,不代表论文的发表时间)