Mobile agent based composite key management scheme for MANET

In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for...

Full description

Saved in:
Bibliographic Details
Published in2011 International Conference on Emerging Trends in Electrical and Computer Technology pp. 964 - 969
Main Authors PushpaLakshmi, R, Kumar, A Vincent Antony, Rahul, R
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2011
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for partitioning network into clusters. The cluster head is elected based on the trust ability of the node. We present a fuzzy logic controller to calculate the trust level of node. Trustworthiness of node is evaluated based on the packet forwarding status of the node. The public key and private key of the cluster head change with respect to it's trust value. The private key is generated by combining key shares generated by partial key generation serving nodes. Mobile agent is used to share information about serving nodes within the cluster and to collect information about the susceptible nodes in the cluster, used for key revocation process. The system guarantees forward secrecy and backward secrecy, as the key of cluster head changes continuously with respect to it's trust value.
AbstractList In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for partitioning network into clusters. The cluster head is elected based on the trust ability of the node. We present a fuzzy logic controller to calculate the trust level of node. Trustworthiness of node is evaluated based on the packet forwarding status of the node. The public key and private key of the cluster head change with respect to it's trust value. The private key is generated by combining key shares generated by partial key generation serving nodes. Mobile agent is used to share information about serving nodes within the cluster and to collect information about the susceptible nodes in the cluster, used for key revocation process. The system guarantees forward secrecy and backward secrecy, as the key of cluster head changes continuously with respect to it's trust value.
Author Kumar, A Vincent Antony
PushpaLakshmi, R
Rahul, R
Author_xml – sequence: 1
  givenname: R
  surname: PushpaLakshmi
  fullname: PushpaLakshmi, R
  email: pushparaman@rediffmail.com
  organization: Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India
– sequence: 2
  givenname: A Vincent Antony
  surname: Kumar
  fullname: Kumar, A Vincent Antony
  organization: Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India
– sequence: 3
  givenname: R
  surname: Rahul
  fullname: Rahul, R
  organization: Dept. of Inf. Technol., PSNA Coll. of Eng. & Technol., Dindigul, India
BookMark eNpFj89Kw0AYxFdU0NY-gR72BRK__Z8FLyVELbR62Xv5NrvRaJOUbC59eyMWnMvM8IOBWZCrfugjIQ8McsbAPm7KylWlyzkwliujgSt7QRZMcimN5Vpf_hfBbsgqpS-YpbXl1t6Sp93g20Ok-BH7iXpMMdB66I5DaqdIv-OJdtjPsPvFqf6cA22Gke7Wb5W7I9cNHlJcnX1J3HPlytds-_6yKdfbrLUwZdYqHoMRPjRgPBYsGPRSYMFrpVCywFFJsEUdQq0EKC0CWq9ABjA8IIoluf-bbWOM--PYdjie9uez4gffZEos
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICETECT.2011.5760259
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424479266
9781424479269
1424479258
9781424479252
EndPage 969
ExternalDocumentID 5760259
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-9952ed73bdf07ba81d7ab43a82c55a41d2a54098cddc530563da9b504d072daa3
IEDL.DBID RIE
ISBN 1424479231
9781424479238
IngestDate Wed Aug 27 02:48:39 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-9952ed73bdf07ba81d7ab43a82c55a41d2a54098cddc530563da9b504d072daa3
PageCount 6
ParticipantIDs ieee_primary_5760259
PublicationCentury 2000
PublicationDate 2011-March
PublicationDateYYYYMMDD 2011-03-01
PublicationDate_xml – month: 03
  year: 2011
  text: 2011-March
PublicationDecade 2010
PublicationTitle 2011 International Conference on Emerging Trends in Electrical and Computer Technology
PublicationTitleAbbrev ICETECT
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000669299
Score 1.4695622
Snippet In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering,...
SourceID ieee
SourceType Publisher
StartPage 964
SubjectTerms Ad hoc network
Ad hoc networks
Certification
certification authority
Clustering algorithms
fuzzy controller
Fuzzy logic
hierarchical clustering
key management
mobile agent
Mobile agents
Public key
security
Title Mobile agent based composite key management scheme for MANET
URI https://ieeexplore.ieee.org/document/5760259
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MnTypbOJvcvBoZtskTQNeZHRMocNDhd1GfhVE3ES6i3-9L21XUTx4S3sICSXve-_1-74AXNvUGqaZpDy1gnIjLNWVV1Qy60yVeS180DsXi3T-zB-XYjmAm14L471vyGd-EobNv3y3sdvQKsPiPUWIVnuwh4Vbq9Xq-ykInYj0aqfdCrZ48c7SqXvOOulcHKnbh2le5tOy9fDs5v1xwUqDL7MDKHYra2klr5NtbSb285dp43-XfgjjbyUfeeox6ggGfj2Cu2JjMBgQHWRVJOCYI4FaHvhbnuCpJm89KYZg9YsDgrktKe4XeTmGcpaX0zntblGgLyqqqVIi8U4y46pIGo3pqdSGM50lVgjNY5doTNpUZp2zItQTzGllRMRdJBOnNTuG4Xqz9idAjJTSpxHCGffcxFKLqmKJ1CpxqcM4dQqjsPHVe-uTser2fPb363PYb_uzgc91AcP6Y-svEeBrc9V82S-y26Fl
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED0VGGAC1CK-8cBIShLbcSyxoKpVC03FEKRulb8iIUSLULrw6zknaRCIgc3JYNmKfO_u8t4zwLVJjKaKioAlhgdMcxOowslAUGN1kTrFndc7Z7Nk_Mwe5nzegZtWC-Ocq8hnru-H1b98uzJr3yrD4j1BiJZbsIO4z6NardV2VBA8EevlRr3ljfGijalT85w24rkolLeTwTAfDvLaxbOZ-ccVKxXCjPYh26ytJpa89tel7pvPX7aN_138AfS-tXzkqUWpQ-i4ZRfuspXGcECUF1YRj2SWeHK5Z3A5gueavLW0GIL1Lw4IZrcku58N8x7ko2E-GAfNPQrBiwzLQEoeOyuotkUotMIEVSjNqEpjw7likY0Vpm0yNdYa7isKapXUPGQ2FLFVih7B9nK1dMdAtBDCJSECGnNMR0LxoqCxUDK2icVIdQJdv_HFe-2UsWj2fPr36yvYHefZdDGdzB7PYK_u1np21zlslx9rd4FwX-rL6it_AVf0pK4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+International+Conference+on+Emerging+Trends+in+Electrical+and+Computer+Technology&rft.atitle=Mobile+agent+based+composite+key+management+scheme+for+MANET&rft.au=PushpaLakshmi%2C+R&rft.au=Kumar%2C+A+Vincent+Antony&rft.au=Rahul%2C+R&rft.date=2011-03-01&rft.pub=IEEE&rft.isbn=9781424479238&rft.spage=964&rft.epage=969&rft_id=info:doi/10.1109%2FICETECT.2011.5760259&rft.externalDocID=5760259
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424479238/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424479238/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424479238/sc.gif&client=summon&freeimage=true