Mobile agent based composite key management scheme for MANET
In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for...
Saved in:
Published in | 2011 International Conference on Emerging Trends in Electrical and Computer Technology pp. 964 - 969 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.03.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for partitioning network into clusters. The cluster head is elected based on the trust ability of the node. We present a fuzzy logic controller to calculate the trust level of node. Trustworthiness of node is evaluated based on the packet forwarding status of the node. The public key and private key of the cluster head change with respect to it's trust value. The private key is generated by combining key shares generated by partial key generation serving nodes. Mobile agent is used to share information about serving nodes within the cluster and to collect information about the susceptible nodes in the cluster, used for key revocation process. The system guarantees forward secrecy and backward secrecy, as the key of cluster head changes continuously with respect to it's trust value. |
---|---|
AbstractList | In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for partitioning network into clusters. The cluster head is elected based on the trust ability of the node. We present a fuzzy logic controller to calculate the trust level of node. Trustworthiness of node is evaluated based on the packet forwarding status of the node. The public key and private key of the cluster head change with respect to it's trust value. The private key is generated by combining key shares generated by partial key generation serving nodes. Mobile agent is used to share information about serving nodes within the cluster and to collect information about the susceptible nodes in the cluster, used for key revocation process. The system guarantees forward secrecy and backward secrecy, as the key of cluster head changes continuously with respect to it's trust value. |
Author | Kumar, A Vincent Antony PushpaLakshmi, R Rahul, R |
Author_xml | – sequence: 1 givenname: R surname: PushpaLakshmi fullname: PushpaLakshmi, R email: pushparaman@rediffmail.com organization: Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India – sequence: 2 givenname: A Vincent Antony surname: Kumar fullname: Kumar, A Vincent Antony organization: Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India – sequence: 3 givenname: R surname: Rahul fullname: Rahul, R organization: Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India |
BookMark | eNpFj89Kw0AYxFdU0NY-gR72BRK__Z8FLyVELbR62Xv5NrvRaJOUbC59eyMWnMvM8IOBWZCrfugjIQ8McsbAPm7KylWlyzkwliujgSt7QRZMcimN5Vpf_hfBbsgqpS-YpbXl1t6Sp93g20Ok-BH7iXpMMdB66I5DaqdIv-OJdtjPsPvFqf6cA22Gke7Wb5W7I9cNHlJcnX1J3HPlytds-_6yKdfbrLUwZdYqHoMRPjRgPBYsGPRSYMFrpVCywFFJsEUdQq0EKC0CWq9ABjA8IIoluf-bbWOM--PYdjie9uez4gffZEos |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICETECT.2011.5760259 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1424479266 9781424479269 1424479258 9781424479252 |
EndPage | 969 |
ExternalDocumentID | 5760259 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-9952ed73bdf07ba81d7ab43a82c55a41d2a54098cddc530563da9b504d072daa3 |
IEDL.DBID | RIE |
ISBN | 1424479231 9781424479238 |
IngestDate | Wed Aug 27 02:48:39 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-9952ed73bdf07ba81d7ab43a82c55a41d2a54098cddc530563da9b504d072daa3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_5760259 |
PublicationCentury | 2000 |
PublicationDate | 2011-March |
PublicationDateYYYYMMDD | 2011-03-01 |
PublicationDate_xml | – month: 03 year: 2011 text: 2011-March |
PublicationDecade | 2010 |
PublicationTitle | 2011 International Conference on Emerging Trends in Electrical and Computer Technology |
PublicationTitleAbbrev | ICETECT |
PublicationYear | 2011 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000669299 |
Score | 1.4695622 |
Snippet | In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering,... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 964 |
SubjectTerms | Ad hoc network Ad hoc networks Certification certification authority Clustering algorithms fuzzy controller Fuzzy logic hierarchical clustering key management mobile agent Mobile agents Public key security |
Title | Mobile agent based composite key management scheme for MANET |
URI | https://ieeexplore.ieee.org/document/5760259 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MnTypbOJvcvBoZtskTQNeZHRMocNDhd1GfhVE3ES6i3-9L21XUTx4S3sICSXve-_1-74AXNvUGqaZpDy1gnIjLNWVV1Qy60yVeS180DsXi3T-zB-XYjmAm14L471vyGd-EobNv3y3sdvQKsPiPUWIVnuwh4Vbq9Xq-ykInYj0aqfdCrZ48c7SqXvOOulcHKnbh2le5tOy9fDs5v1xwUqDL7MDKHYra2klr5NtbSb285dp43-XfgjjbyUfeeox6ggGfj2Cu2JjMBgQHWRVJOCYI4FaHvhbnuCpJm89KYZg9YsDgrktKe4XeTmGcpaX0zntblGgLyqqqVIi8U4y46pIGo3pqdSGM50lVgjNY5doTNpUZp2zItQTzGllRMRdJBOnNTuG4Xqz9idAjJTSpxHCGffcxFKLqmKJ1CpxqcM4dQqjsPHVe-uTser2fPb363PYb_uzgc91AcP6Y-svEeBrc9V82S-y26Fl |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED0VGGAC1CK-8cBIShLbcSyxoKpVC03FEKRulb8iIUSLULrw6zknaRCIgc3JYNmKfO_u8t4zwLVJjKaKioAlhgdMcxOowslAUGN1kTrFndc7Z7Nk_Mwe5nzegZtWC-Ocq8hnru-H1b98uzJr3yrD4j1BiJZbsIO4z6NardV2VBA8EevlRr3ljfGijalT85w24rkolLeTwTAfDvLaxbOZ-ccVKxXCjPYh26ytJpa89tel7pvPX7aN_138AfS-tXzkqUWpQ-i4ZRfuspXGcECUF1YRj2SWeHK5Z3A5gueavLW0GIL1Lw4IZrcku58N8x7ko2E-GAfNPQrBiwzLQEoeOyuotkUotMIEVSjNqEpjw7likY0Vpm0yNdYa7isKapXUPGQ2FLFVih7B9nK1dMdAtBDCJSECGnNMR0LxoqCxUDK2icVIdQJdv_HFe-2UsWj2fPr36yvYHefZdDGdzB7PYK_u1np21zlslx9rd4FwX-rL6it_AVf0pK4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+International+Conference+on+Emerging+Trends+in+Electrical+and+Computer+Technology&rft.atitle=Mobile+agent+based+composite+key+management+scheme+for+MANET&rft.au=PushpaLakshmi%2C+R&rft.au=Kumar%2C+A+Vincent+Antony&rft.au=Rahul%2C+R&rft.date=2011-03-01&rft.pub=IEEE&rft.isbn=9781424479238&rft.spage=964&rft.epage=969&rft_id=info:doi/10.1109%2FICETECT.2011.5760259&rft.externalDocID=5760259 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424479238/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424479238/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424479238/sc.gif&client=summon&freeimage=true |