Reference Hub5
A Survey of Key Management in Mobile Ad Hoc Networks

A Survey of Key Management in Mobile Ad Hoc Networks

Bing Wu, Jie Wu, Mihaela Cardei
Copyright: © 2008 |Pages: 21
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch030
Cite Chapter Cite Chapter

MLA

Wu, Bing, et al. "A Survey of Key Management in Mobile Ad Hoc Networks." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 479-499. https://doi.org/10.4018/978-1-59904-899-4.ch030

APA

Wu, B., Wu, J., & Cardei, M. (2008). A Survey of Key Management in Mobile Ad Hoc Networks. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 479-499). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch030

Chicago

Wu, Bing, Jie Wu, and Mihaela Cardei. "A Survey of Key Management in Mobile Ad Hoc Networks." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 479-499. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch030

Export Reference

Mendeley
Favorite

Abstract

Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and nonrepudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, and so forth. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node’s available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this chapter, we present a survey of the research work on key management in MANETs according to recent literature.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.