Key Management in Ad-Hoc Networks

Key management is crucial part of security in communications. In wireless ad-hoc network, the issue is even bigger. As there is no infrastructure in the network, the distribution of encryption keys in an authenticated manner is a difficult task. In this paper, key management aspects are discussed by first describing different key management approaches followed by some ways to authenticate key exchange protocols. Finally short overview of keys in Wireless LAN is given.

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[4]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[5]  Christian Gehrmann,et al.  Manual authentication for wireless devices , 2004 .

[6]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[7]  Srdjan Capkun,et al.  Key Agreement in Peer-to-Peer Wireless Networks , 2006, Proceedings of the IEEE.

[8]  N. Asokan,et al.  Ad Hoc Security Associations for Groups , 2006, ESAS.

[9]  Jan-Erik Ekberg Key establishment in constrained devices , 2006 .

[10]  Sven Laur,et al.  Efficient Mutual Data Authentication Using Manually Authenticated Strings , 2006, CANS.

[11]  Kaisa Nyberg,et al.  Wireless Group Security Using MAC Layer Multicast , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.