A reliable topology for efficient key distribution in ad-hoc networks

Kenji Miyao, Hidehisa Nakayama, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Data confidentiality is one of the most important concerns in security of ad-hoc networks which have been widely studied in recent years. In this paper, we consider the public-key cryptography which is one of the simplest and viable means to maintain data confidentiality. There are several ways to distribute a public key. Flooding is an intuitive approach to distribute each node'spublic key. However, the normal flooding approach is costly, and can cause MAClevel contention in a dense region of nodes. Tree based topology flooding can be appied to mitigate these problems. The construction algorithm should use ideally only local information. In this paper, we propose a completely localized algorithm called the Local Tree-based Reliable Topology (LTRT) algorithm, which achieves both reliability and efficiency. LTRT is a localized version of TRT that has 2-edge connectivity. Each node can distribute its public key to all other nodes in the network by LTRT. Simulation results show the efficiency of LTRT and its superiority over other localized algorithms.

Original languageEnglish
Title of host publication2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM2008
DOIs
Publication statusPublished - 2008 Sep 24
Event9th IEEE International Symposium on Wireless, Mobile and Multimedia Networks, WoWMoM 2008 - Newport Beach, CA, United States
Duration: 2008 Jun 232008 Jun 26

Publication series

Name2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM2008

Other

Other9th IEEE International Symposium on Wireless, Mobile and Multimedia Networks, WoWMoM 2008
CountryUnited States
CityNewport Beach, CA
Period08/6/2308/6/26

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A reliable topology for efficient key distribution in ad-hoc networks'. Together they form a unique fingerprint.

Cite this