전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법

An Efficient Key Management Scheme in Tactical Ad-Hoc Network

  • 발행 : 2009.06.05

초록

Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

키워드

참고문헌

  1. http://kor.samsungthales.com
  2. 합참, 군 전술종합정보통신체계 운영개념서, 2006
  3. 전자통신동향분석 제18권 제2호, 2003. 4
  4. Charles E. Perkins, Ad-hoc Networking, Addison Wesley, 2001
  5. C. K. Toh, Ad-hoc Mobile Wireless Networks : Protocols and Systems, Prentice Hall PTR, 2002
  6. 국방대학교, 정보시스템 보안론, 2003
  7. N. Asokan, P. Ginzborg, 'Key Agreement in Adhoc Network', Computer Communications Volume 23, 2000
  8. Laurent Eschenauer, Virgil D. Gligor, 'A Key Management Scheme for Distributed Sensor Networks', In Proceedings of the 9th ACM Conference on Computer and Communication Security, 2002
  9. L. Zhou and Z. J. Haas, 'Securing Ad Hoc Networks', IEEE Network, 13(6) : 24-30, Nov/Dec, 1999 https://doi.org/10.1109/65.806983
  10. S. Zhu, S. XU, S. Seita, S. Jajodia, 'Establishing Pairwise Keys for Secure Communication in Ad-hoc Networks : A Probabilistic Approach', In Proceedings of the 11th IEEE Conference on Network Protocols (ICNP'03), 2003 https://doi.org/10.1109/ICNP.2003.1249782