Academic literature on the topic 'Secure Routing with Localized Key Management Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Routing with Localized Key Management Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure Routing with Localized Key Management Protocol"

1

Jayaprakash, R., and B. Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.

Full text
Abstract:
The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS (Dynamic Load Balancing Privacy Path Selection) procedure. To lock the data from the malicious node, the Paillier Cryptosystem (PC) encrypts packets with homomorphic encryption. The trust score makes it easier to update routing information and improves network throughput. The experimental results show that the proposed TKMP method works better than the other Trust-ECC method.
APA, Harvard, Vancouver, ISO, and other styles
2

Rathee, Geetanjali, and Hemraj Saini. "Secure Buffer-Based Routing Protocol for WMN." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 28–44. http://dx.doi.org/10.4018/ijbdcn.2017010103.

Full text
Abstract:
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a routed path may reduce the performance of the entire network. A number of secure routing protocols have been proposed by different researchers but enhancement of a single network parameter (i.e. security) may affect another performance metrics significantly i.e. throughput, end to end delay, packet delivery ratio etc. In order to ensure secure routing with improved network metrics, a Secure Buffer based Routing Protocol i.e. SBRP is proposed which ensures better network performance with increased level of security. SBRP protocol uses buffers at alternate positions to fasten re-routing mechanism during node/link failure and ensures the security using AES encryption. Further the protocol is analyzed against mAODV protocol in both static and dynamic environment in terms of security, packet delivery ratio, end to end delay and network throughput.
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Zhe Fu, Hai Gang Zhou, and Zhao Feng Wu. "A Secure Routing Protocol Based on Certificateless Signcryption for Satellite Networks." Advanced Materials Research 546-547 (July 2012): 1065–70. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1065.

Full text
Abstract:
The article introduces a certificateless signcryption scheme targeting the problem of lacking of security mechanism in the routing of satellite networks, and designs a secure routing protocol suitable for the satellite networks. The proposed protocol avoids complicated management in the certificate mechanism and bypasses the key escrow problem in the identity-based cryptography using the certificateless cryptography and signcryption. The analysis shows that the new protocol can resist several common attacks, effectively improve the security of the satellite networks routing.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaur, Jugminder, Sandeep S. Gill, and Balwinder S. Dhaliwal. "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks." Journal of Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2089714.

Full text
Abstract:
Security is always a major concern in wireless sensor networks (WSNs). Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF) routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS) to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF) is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.
APA, Harvard, Vancouver, ISO, and other styles
5

K.R, Shibu, and Suji Pramila R. "Routing protocol based key management schemes in manet: a survey." International Journal of Engineering & Technology 7, no. 3 (July 11, 2018): 1453. http://dx.doi.org/10.14419/ijet.v7i3.14219.

Full text
Abstract:
Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET). It also analyses them in terms of the security and applicability.
APA, Harvard, Vancouver, ISO, and other styles
6

Fernandes, Natalia Castro, and Otto Carlos Muniz Bandeira Duarte. "A lightweight group-key management protocol for secure ad-hoc-network routing." Computer Networks 55, no. 3 (February 2011): 759–78. http://dx.doi.org/10.1016/j.comnet.2010.10.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (January 20, 2022): 1041. http://dx.doi.org/10.3390/app12031041.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire network’s security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols.
APA, Harvard, Vancouver, ISO, and other styles
8

Kamboj, Nippun, Dalip, and Munishwar Rai. "A New Secure Ad-Hoc on Demand Distance Vector Routing Protocol to Ensure Less Power Consumption in Mobile Ad-Hoc Network." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2483–87. http://dx.doi.org/10.1166/jctn.2020.8919.

Full text
Abstract:
Current time represents the era of communication technology and in this revolution MANET is widely used and act as a key star for data communication in real life decisive scenario for e.g., disaster management, traffic control, military services etc. MANET is infrastructureless data communication network comprising of mobile nodes. For MANET it requires secure and energy efficient framework for the underlying routing protocol. To meet the need of efficient data communication in MANET, an Energy Efficient and Secure AODV (EES-AODV) protocol is proposed. In the projected routing protocol, first the order of network nodes happen dependent on energy and afterward encryption has been done. Simulation of projected protocol is performed for such as Average Delay, PDR and Throughput. Simulated results shows that modified AODV gives optimized performance and provides a more secure and energy aware protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

LIN, H. Y. "Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks." IEICE Transactions on Communications E88-B, no. 9 (September 1, 2005): 3598–613. http://dx.doi.org/10.1093/ietcom/e88-b.9.3598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Iqbal, J. L. Mazher, and G. L. Anil. "Secure Energy Efficient Network Priority Routing Protocol for Effective Data Collection and Key Management in Dynamic WSNs." International Journal of Information and Computer Security 13, no. 2 (2020): 1. http://dx.doi.org/10.1504/ijics.2020.10023138.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Secure Routing with Localized Key Management Protocol"

1

Talawar, Shrikant. "Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks." Thesis, 2015. https://etd.iisc.ac.in/handle/2005/4545.

Full text
Abstract:
There is a need to protect mobile ad hoc network (MANET) from external attackers as well as internal attackers during route discovery and end-to-end key establishment. During route discovery, the external attackers can be prevented from participating in routing activities of the MANET with the help of an efficient key management protocol and cryptography. In this thesis, we propose a novel secure routing with localized key management (SR-LKM) protocol, which is aimed to prevent both internal as well as external attackers from participating in routing activities of the MANET. We make use of Public Key Certificate(PKC) to identify each node. Since the use of PKC is heavy in terms of communication and computation cost for routing activities, we use neighbor-based handshaking mechanism to establish one hop shared secret key, and lightweight Least Common Multiple based (LCM) mechanism to establish local broadcast key. The broadcast key is used for authentication, and the shared secret key between one hop neighbors is used for both authentication and confidentiality. Hence, the use of these keys prevents the external attackers from participating in routing activities. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management – secure routing interdependency problem. In order to prevent internal attackers from participating in routing activities, the protocol is accompanied with an intrusion detection system (IDS). However, SR-LKM protocol does not provide end-to-end security, and it is limited to one hop neighborhood only. An end-to-end key between two distant nodes in a MANET is essential for providing end-to-end security. At the same time, end-to-end key establishment phase should be protected against both external and internal attackers. Most of the protocols for end-to-end key establishment in MANETs either make an unrealistic assumption that an end-to-end secure channel exists between source and destination or use bandwidth consuming multi-path schemes. In this thesis, we propose a simple and efficient protocol for end-to-end key establishment during route discovery (E2-KDR) in MANETs. Unlike many other existing schemes, the protocol establishes end-to-end key using trust among the nodes which, during initial stage, is established using PKC issued by an off-line membership granting authority. We use SR-LKM’s protocol one hop shared secret key and local broadcast keys to protect end-to-end keying messages against external attackers, and trusted-nodes mechanism to protect against internal attackers. Since the end-to-end key is established during route discovery phase, it reduces the key establishment time. It provides comprehensive solution by making use of symmetric keys for protecting routing control messages and end-to-end communication. Moreover, as the end-to-end keys are established during route discovery phase, the protocol is on-demand and only necessary keys are established, which makes the protocol storage scalable. The SR-LKM and the E2-KDR protocols are shown to be secure using security analysis, and their efficiency is confirmed by the results obtained from simulation experiments. Moreover, efficiency of the SR-LKM protocol is also confirmed using a testbed implementation.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure Routing with Localized Key Management Protocol"

1

Kim, Jinsu, Seongyong Choi, Seungjin Han, Junhyeog Choi, Junghyun Lee, and Keewook Rim. "Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol." In Future Generation Information Technology, 181–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10509-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure Routing with Localized Key Management Protocol"

1

Talawar, Shrikant H., Soumyadev Maity, and R. C. Hansdah. "Secure Routing with an Integrated Localized Key Management Protocol in MANETs." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Jin-Su, Hyung-Seok Joo, Jung-Hyun Lee, and Kee-Wook Rim. "Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol." In 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccit.2009.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Kun, Cong Wang, and Cuirong Wang. "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography