Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications
ISSN: 2320-7248 Impact Factor:1.8 Volume:1 Issue:2 Year: 08 March,2013 Pages:7-12
In this paper, we study about location based key management scheme in wireless mission-critical networks. A challenge of the key distribution scheme is to use small memory size to establish secure communication among a large number of nodes and achieve good resilience. In this paper, we present a new paradigm of public key management scheme based on combinatorial design where nodes combine more than one key to encrypt and decrypt every message. Here key allocation scheme guarantees that a set of keys held by one user is not a subset of keys held by any other user. It is challenging to design a self-constrained key management scheme in current wireless ad hoc networks. In this system we propose to support secure communications with the attributes of data integrity, authentication, confidentiality, non repudiation. To build a secure communication system, usually the first attempt is to employ cryptographic keys.
automotive networks, health care systems, critical infrastructure monitoring, military applications
[1]Wenbo He ¤ Ying Huangy, Ravishankar Sathyam, Klara Nahrstedty , Whay C. Leez , "SMOCK: A ScalableMethod of CryptographicKey Management for Missioncritical Wireless Ad Hoc Networks ", IEEE transactions on information forensics and security, vol. 4, no. 1, march 2009 . [2] Wenbo He, Ying Huang, Klara Nahrstedt ,Whay C. Lee , “SMOCK: A ScalableMethod of CryptographicKey Management For MissionCritical Networks.