dc.contributor.author | Hegland, Anne Marie | |
dc.contributor.author | Winjum, Eli | |
dc.contributor.author | Mjølsnes, Stig Frode | |
dc.contributor.author | Rong, Chunming | |
dc.contributor.author | Kure, Øivind | |
dc.contributor.author | Spilling, Pål | |
dc.date.accessioned | 2017-11-14T12:31:48Z | |
dc.date.accessioned | 2017-11-15T08:24:18Z | |
dc.date.available | 2017-11-14T12:31:48Z | |
dc.date.available | 2017-11-15T08:24:18Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Hegland AM, Winjum E, Mjølsnes SF, Rong C, Kure Ø, Spilling P. Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorials. 2006;8(3):48-66 | en_GB |
dc.identifier.uri | http://hdl.handle.net/20.500.12242/805 | |
dc.identifier.uri | https://ffi-publikasjoner.archive.knowledgearc.net/handle/20.500.12242/805 | |
dc.description | Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål.
Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorials 2006 ;Volum 8.(3) s. 48-66 | en_GB |
dc.description.abstract | The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. A main challenge is to judge whether or not a routing message originates from a trustworthy node. The solution thus far is cryptographically signed messages. The general assumption is that nodes in possession of a valid secret key can be trusted. Consequently, a secure and efficient key-management scheme is crucial. Keys are also required for protection of application data. However, the focus here is on network-layer management information. Whereas keymanagement schemes for the upper layers can assume an already running network service, schemes for the protection of the network layer cannot. Keys are a prerequisite to bootstrap a protected network service. This article surveys the state of the art within key management for ad hoc networks, and analyzes their applicability for network-layer security. The analysis puts some emphasis on their applicability in scenarios such as emergency and rescue operations, as this work was initiated by a study of security in MANETs for emergency and rescue operations. | en_GB |
dc.language.iso | en | en_GB |
dc.subject | TermSet Emneord::Mobile nettverk | |
dc.subject | TermSet Emneord::Trådløs kommunikasjon | |
dc.subject | TermSet Emneord::Kryptografi | |
dc.title | Survey of Key Management in Ad Hoc Networks | en_GB |
dc.type | Article | en_GB |
dc.date.updated | 2017-11-14T12:31:48Z | |
dc.identifier.cristinID | 376157 | |
dc.identifier.cristinID | 376157 | |
dc.identifier.doi | 10.1109/COMST.2006.253271 | |
dc.source.issn | 1553-877X | |
dc.type.document | Journal article | |
dc.relation.journal | IEEE Communications Surveys and Tutorials | |