• DocumentCode
    1644936
  • Title

    Key Management Scheme Based on Threshold for Heterogeneous Wireless Networks

  • Author

    Wang, Xinying ; Wu, Zhao

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Xiangfan Univ., Xiangfan, China
  • fYear
    2011
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Key management is central to ensuring privacy protection in heterogeneous wireless networks. Following the analysis of existing distributed trust model to heterogeneous wireless networks, this paper proposes an effective key management scheme based on threshold. The scheme achieves two-way authentication between the nodes, with strong capability of anti-counterfeiting attack and anti-replaying attack. It can not only revoke malicious nodes, but also resist denial of services. Simulation results show the improvements achieved by our proposal in terms of effectiveness and survivability to different attacks. The scheme is suited to heterogeneous wireless networks based on cellular networks and ad hoc networks.
  • Keywords
    ad hoc networks; cellular radio; cryptography; data privacy; telecommunication network management; telecommunication security; ad hoc network; anti-counterfeiting attack; anti-replaying attack; cellular network; denial of services resistance; distributed trust model; heterogeneous wireless network; key management scheme; malicious nodes; privacy protection; two-way authentication; Ad hoc networks; Authentication; Base stations; Computer crime; Receivers; Wireless networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on
  • Conference_Location
    Wuhan
  • ISSN
    2161-9646
  • Print_ISBN
    978-1-4244-6250-6
  • Type

    conf

  • DOI
    10.1109/wicom.2011.6040158
  • Filename
    6040158