Browse > Article
http://dx.doi.org/10.7840/KICS.2011.36B.11.1413

A Hybrid Key Management Scheme in Tactical Ad-hoc Network  

Lee, Yun-Ho (국방대학교 국방정보체계학과)
Lee, Soo-Jin (국방대학교 국방정보체계학과)
Abstract
A next generation military communication system called Tactical Information Communication Network(TICN) is designed to advance into large capacity, high speed, and long distance wireless relay transmission. To support mobility in battlefield, the application of Ad-hoc networking technology to its wireless communication is being considered. In Ad-hoc network, the key management technique is very important to ensure the confidentiality, integrity, and authentication. In this paper, we propose a new hybrid key management scheme considering the hierarchical characteristics of the tactical ad-hoc such as TICN. For upper layer with sufficient energy and computation capability, we apply PKI based key management scheme. For lower layer with restricted resources, we propose a new key management scheme using the location-based authentication to ensure the energy efficiency.
Keywords
Ad-hoc; key management; TICN;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Du, 1. Deng, Y.S. han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowlege," in Proceeding of IEEE INFOCOM, pp. 586-597, 2004
2 J. Lee, T. Kwon, and J. Song, "Location-Aware Key Management using multi-layer grids for WSN," Applied Cryptography and Network Security '06, LNCS 3989, pp. 390-404, 2006
3 M. Puzar, J. Andersson, T. Plagemann, Y. Roudier, "SKiMPy; A Simple Key Management Protocol for MANETs in Emergency and Rescure Operations," in Proceeding of ESAS '05, 2005
4 M. Bouassida, I. Chrisment, and o. Festor, "Group Key Management in MANETs," International Journal of Network Security, Vol.6, No.1, pp. 67-79, Jan. 2008
5 I. Chuang, W. Su, C. Wu, J. Hsu and Y. Kuo, "Two-layered Dynamic Key Management in Mobile and Long-lived Cluster-based Wireless Sensor Networks," in Proceedings of IEEE Wireless Communications and Networking Conference, pp.4145-4150, March 2007
6 박귀순, 황정섭, "미래 전장 환경변화에 따른 TICN 체계 요구 기능 및 능력," Telecommunications review, 제 20권 2호,pp.196-206, 4월, 2010년.
7 A. M. Hegland, E. Winjum, S.F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, "A survey of key management in ad hoc networks" IEEE Communications Surverys & Tutorials, 3rd Quarter 2006
8 M. Bohge, and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks", In ACM workshop on Wireless Security, 2003
9 Y. Cheng, D.P. Agrwal, "An improved key distribution mechanism for large-scale hierachical wireless sensor networks," Journal of Ad Hoc Networks, vol. 5, pp. 35-48, 2007   DOI   ScienceOn
10 A. Shamir, "How to Share a Secret," Communication of ACM, vol. 22, pp.612-613 Nov. 1979   DOI   ScienceOn
11 L. Zhou and Z.J. Haas, "Securing Ad Hoc Network," IEEE Networking Mag., vol.13, pp.24-30, Nov. 1999
12 L. Eschenauer, and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in Proceeding of 9th ACM conference on CCS, Nov. 2002
13 S. Yi and R. Kravets, "MOCA: MObile Certificate Authority for Wireless Ad Hoc Networks," in Proceedings of 2nd Annual PKI Research Workshop, pp. 65-79, April, 2003
14 B. Wu, J. Wu, E.B. Femandez, M. Dyas, S. Magliveras, "Secure and efficient key management in mobile ad hoc network," Journal of Network and Computer Applications, vol 30, pp. 937-954, August 2007   DOI   ScienceOn
15 S. Zhu, S. Setia, and S.Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proceeding of CSS'03, 2003
16 H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," IEEE Symp. Security and Privacy, pp. 197-213, 2003