A reliable topology for efficient key distribution in ad-hoc networks

Kenji Miyao, Hidehisa Nakayama, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Data confidentiality is one of the most important concerns in security of ad-hoc networks which have been widely studied in recent years. In this paper, we consider the public-key cryptography which is one of the simplest and viable means to maintain data confidentiality. There are several ways to distribute a public key. Flooding is an intuitive approach to distribute each node'spublic key. However, the normal flooding approach is costly, and can cause MAClevel contention in a dense region of nodes. Tree based topology flooding can be appied to mitigate these problems. The construction algorithm should use ideally only local information. In this paper, we propose a completely localized algorithm called the Local Tree-based Reliable Topology (LTRT) algorithm, which achieves both reliability and efficiency. LTRT is a localized version of TRT that has 2-edge connectivity. Each node can distribute its public key to all other nodes in the network by LTRT. Simulation results show the efficiency of LTRT and its superiority over other localized algorithms.

Original languageEnglish (US)
Title of host publication2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM2008
DOIs
StatePublished - Sep 24 2008
Event9th IEEE International Symposium on Wireless, Mobile and Multimedia Networks, WoWMoM 2008 - Newport Beach, CA, United States
Duration: Jun 23 2008Jun 26 2008

Publication series

Name2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM2008

Other

Other9th IEEE International Symposium on Wireless, Mobile and Multimedia Networks, WoWMoM 2008
CountryUnited States
CityNewport Beach, CA
Period6/23/086/26/08

All Science Journal Classification (ASJC) codes

  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A reliable topology for efficient key distribution in ad-hoc networks'. Together they form a unique fingerprint.

Cite this