Efficient key management protocols for mobile ad hoc networks Public Deposited

http://ir.library.oregonstate.edu/concern/graduate_thesis_or_dissertations/nv935607r

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed, self-organizing, scalable and does not employ online key distribution authority or group manager. Two different group authentication and group key establishment protocols are proposed for the users who form an ad hoc group with distributed trust model. Initially proposed protocols are based on public key cryptography and do not use specific algorithm. However, members can establish the keys faster with proposed customized hybrid scheme which combines elliptic curve cryptography, modular squaring operations and secret key encryption algorithm. Proposed HBT based model provides complete backward and forward security in case of modification in membership and it has comparable efficiency to the other HBT based schemes which employ real time key distribution authority. Mutual authentication and link encryption can be achieved in wireless sensor network only with public key cryptography if there are no pre-distributed keys. However, constraints in resources make fully public key operations not affordable on sensor. Three different authenticated key establishment protocols are proposed with an objective of being respectful to constraints. Sensor needs to make only modular or cyclic convolution multiplications, and expensive public key decryption operation is executed at the data processing station side. Schemes require small size of code and achieve the least sensor processing time in comparison with fully public key cryptography based protocols.
Resource Type
Date Available
Date Copyright
Date Issued
Degree Level
Degree Name
Degree Field
Degree Grantor
Commencement Year
Advisor
Academic Affiliation
Non-Academic Affiliation
Subject
Rights Statement
Peer Reviewed
Language
Digitization Specifications
  • File scanned at 300 ppi (Monochrome) using ScandAll PRO 1.8.1 on a Fi-6670 in PDF format. CVista PdfCompressor 4.0 was used for pdf compression and textual OCR.
Replaces
Additional Information
  • description.provenance : Approved for entry into archive by Patricia Black(patricia.black@oregonstate.edu) on 2012-05-23T17:30:59Z (GMT) No. of bitstreams: 1 ErdemOzkanM2005.pdf: 742263 bytes, checksum: a811491292f5682d32d3bc6efe0ec3f9 (MD5)
  • description.provenance : Submitted by Kaylee Patterson (kdpscanner@gmail.com) on 2012-05-22T21:09:50Z No. of bitstreams: 1 ErdemOzkanM2005.pdf: 742263 bytes, checksum: a811491292f5682d32d3bc6efe0ec3f9 (MD5)
  • description.provenance : Approved for entry into archive by Patricia Black(patricia.black@oregonstate.edu) on 2012-05-23T17:27:32Z (GMT) No. of bitstreams: 1 ErdemOzkanM2005.pdf: 742263 bytes, checksum: a811491292f5682d32d3bc6efe0ec3f9 (MD5)
  • description.provenance : Made available in DSpace on 2012-05-23T17:30:59Z (GMT). No. of bitstreams: 1 ErdemOzkanM2005.pdf: 742263 bytes, checksum: a811491292f5682d32d3bc6efe0ec3f9 (MD5) Previous issue date: 2005-03-18

Relationships

In Administrative Set:
Last modified: 08/15/2017

Downloadable Content

Download PDF
Citations:

EndNote | Zotero | Mendeley

Items