DocumentCode
1644936
Title
Key Management Scheme Based on Threshold for Heterogeneous Wireless Networks
Author
Wang, Xinying ; Wu, Zhao
Author_Institution
Dept. of Comput. Sci. & Technol., Xiangfan Univ., Xiangfan, China
fYear
2011
Firstpage
1
Lastpage
4
Abstract
Key management is central to ensuring privacy protection in heterogeneous wireless networks. Following the analysis of existing distributed trust model to heterogeneous wireless networks, this paper proposes an effective key management scheme based on threshold. The scheme achieves two-way authentication between the nodes, with strong capability of anti-counterfeiting attack and anti-replaying attack. It can not only revoke malicious nodes, but also resist denial of services. Simulation results show the improvements achieved by our proposal in terms of effectiveness and survivability to different attacks. The scheme is suited to heterogeneous wireless networks based on cellular networks and ad hoc networks.
Keywords
ad hoc networks; cellular radio; cryptography; data privacy; telecommunication network management; telecommunication security; ad hoc network; anti-counterfeiting attack; anti-replaying attack; cellular network; denial of services resistance; distributed trust model; heterogeneous wireless network; key management scheme; malicious nodes; privacy protection; two-way authentication; Ad hoc networks; Authentication; Base stations; Computer crime; Receivers; Wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on
Conference_Location
Wuhan
ISSN
2161-9646
Print_ISBN
978-1-4244-6250-6
Type
conf
DOI
10.1109/wicom.2011.6040158
Filename
6040158
Link To Document