Composite key management for ad hoc networks

Seung Yi, Robin Kravets

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present Composite Key Management, a novel paradigm for key management in ad hoc networks. While most existing approaches try to fit techniques developed for wired environments into ad hoc networks, our approach works within the specific limitations of ad hoc networks to increase security and availability of the key management framework. By composing techniques from PKI and certificate chaining, composite key management follows two fundamental principles that must be satisfied by an ad hoc key management framework: node participation and the use of a trusted third party. We introduce enhanced metrics of authentication to aid end users in understanding and using the key management framework. Through simulation studies, we demonstrate the effectiveness of composite key management under stressful scenarios where previous approaches fail and show that composite key management can address the challenges posed by the unique nature of ad hoc networks.

Original languageEnglish (US)
Title of host publicationProceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems
Subtitle of host publicationNetworking and Services
Pages52-61
Number of pages10
StatePublished - 2004
EventProceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services - Boston, MA, United States
Duration: Aug 22 2004Aug 26 2004

Publication series

NameProceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services

Other

OtherProceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
CountryUnited States
CityBoston, MA
Period8/22/048/26/04

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Composite key management for ad hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Yi, S., & Kravets, R. (2004). Composite key management for ad hoc networks. In Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (pp. 52-61). (Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services).