scholarly journals SECURING CLUSTER BASED ADHOC NETWORK THROUGH BALANCED CLUSTERING WITH DISTRIBUTION AUTHORITIES OF KEY DISTRIBUTION AND KEY MANAGEMENT USING DEPLOYMENT KNOWLEDGE.

2013 ◽  
Vol 02 (12) ◽  
pp. 316-324
Author(s):  
Priyanka Manhas .
Author(s):  
Saju P. John ◽  
Philip Samuel

Owing to the wireless and dynamic nature, MANETs are susceptible to security attacks from malicious nodes. Key management, certificate exchange and certificate revocation mechanisms play a vital role in securing the network from attacks. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network. This paper surveys various existing mechanisms in key management and certificate exchange. Key management methods are broadly classified into two types namely, contributory and distributive methods. Here, certificate distribution and exchange techniques are classified as trust-based and non-trust based methods. Certificate revocation techniques are classified as voting-based, cluster-based and trust-based schemes. The merits and demerits of each mechanism along with the performance are analyzed. Finally, a comparison table is designed to compare the existing mechanisms in an effective manner.


2019 ◽  
Vol 4 (6) ◽  
pp. 111-116
Author(s):  
Porkodi Chinniah ◽  
Sangavai Krishnamoorthi

Distributed Sensor Networks are broadly used in many applications and key distribution is a challenging task. In this work, a key management scheme is developed for distributed sensor networks based on elliptic curve cryptography over prime field. Key distribution among the nodes and interactive as well as non interactive protocols for agreement of common secret key for message transmission between two nodes are discussed. The probability for connectivity of the network generated according to the proposed key distribution scheme is discussed in detail. The implementation of the proposed scheme is done using NetSim interfaced with MATLAB. Connectivity of the network is also checked through eigenvalues of the Laplacian matrix of the network.   


2018 ◽  
Vol 7 (3.34) ◽  
pp. 554
Author(s):  
Seung Hwan Ju ◽  
Hee Suk Seo

Background/Objectives: Security features are an essential part of recent smart metering systems. Smart meters are considered an important facility that must be protected by applying the latest security technologies.Methods/Statistical analysis: Security context determines the rules for applying/verifying security. DLMS/COSEM have Security suite to set of cryptographic algorithms. This is based on symmetric key based cryptographic communication. The high level security requires public key based cryptographic communication and digital signature.The security specification references the key scheme of DLMS-COSEM, which is based on a single set of unique symmetric keys per meter.Findings: we have studied a sequence for distributing security keys required by DLMS / COSEM.Our smart metering key distribution system can provide a security key management system such as key generation / distribution between AMI components. This is a PKI-based authentication using public key method (ECC), and a DLMS standard key distribution method after generating a session key using a public key. This system can also provide a key management scheme between DLMS clients not defined in the DLMS standard.Improvements/Applications: we analyze security requirements of DLMS/COSEM for secure smart metering and design key distribution/management method.  


2012 ◽  
Vol 5 (4) ◽  
pp. 130-141
Author(s):  
N. Sugandhi ◽  
S. Mirdula ◽  
D. Manivannan ◽  
R. Ranjini ◽  
D.H. Sharmili Minu

Sign in / Sign up

Export Citation Format

Share Document