首页 | 本学科首页   官方微博 | 高级检索  
     


Improved migration for mobile computing in distributed networks
Affiliation:1. Department of Information Management, Chang Gung University, Tao-Yuan 333, Taiwan, ROC;2. Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32816-2362, United States;3. Ministry of Justice, Investigation Bureau (MJIB), Taipei 231, Taiwan, ROC;1. Beijing University of Posts and Telecommunications, 100876 PR China;2. France Telecom Research & Development, Beijing 100190, PR China;1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China;2. Dept. of Communications Engineering, Nanjing Institute of Technology, Nanjing 211167, China;1. Dept. Automatic Control and Systems Engineering, UPV/EHU, Spain;2. Instituto de Telecomunicações/DEEC-FEUP, Universidade do Porto, Portugal;3. Tecnalia Research & Innovation, Zamudio, Spain
Abstract:A mobile ad hoc network (MANET) is a special type of wireless network in which a collection of mobile nodes with wireless network interfaces may form a temporary network, without the aids of any fixed infrastructure. Security has become a hot research topic in mobile ad hoc networks. In 1998, Volker and Mehrdad proposed a tree-based key management and access control scheme for the mobile agents to manage rights to access its own resources for the visited mobile nodes. Latter, Huang et al. showed that Volker and Mehrdad's scheme needs a large amount of storage and costs for managing and storing secret keys. Huang et al. further proposed a new and efficient scheme based on the elliptic curve cryptosystems to reduce costs and gain better efficiency. However, there is a security leak inherent in Huang et al.'s scheme that the malicious node can overstep his authority to access unauthorized information. This paper will propose a secure, robust, and efficient hierarchical key management scheme for MANETs. Some practical issues and solutions about dynamic key management are also considered and proposed. As compared with Huang et al.'s scheme, our proposed scheme can provide better security assurance, while requiring smaller key-size, lower computational complexities, and constant key management costs which is independent on the number of the confidential files and the visited nodes.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号