Open Access Open Access  Restricted Access Subscription or Fee Access

An Evaluation of Suitable Key Management Schemes in Mobile Adhoc Networks

Dr. G. Padmavathi, Dr. P. Subashini, D. Devi Aruna


Mobile ad hoc networks, or MANETs, are wireless networks that do not depend on a fixed infrastructure. Mobile nodes may form networks on the fly for a variety of environments including emergency rescue missions, sensor networks, military applications,and open networks of personal wireless devices. Wireless nodes can communicate directly with neighboring nodes that are within their transmission ranges. To reach nodes outside the direct transmission range, nodes depend on each other to forward their packets, creating
a multihop network with many vulnerability points. Cryptographic techniques are essential to the protection of both routing information and application data. A secure and efficient management of cryptographic keys is crucial for a reliable network service and thus the success for wireless ad hoc networks. This paper evaluates and surveys the key management schemes available for mobile adhoc network.


Mobile ad hoc network, key management, public key scheme, Symmetric key scheme, Security.

Full Text:



Matei Ciobanu Morogan,”Efficient Key Management Scheme for Mobile Ad Hoc Network “Royal Institute of Technology (KTH) SecLab Department of Computer and System Sciences (DSV),February 10,2005.

Lidong Zhou,”Securing Ad Hoc Networks” Cornell University Ithaca To be published in IEEE network, special issue on network security,November/December, 1999.

Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges” , School of Engineering,University of Texas at Dallas, Dallas, TX, USA, 2003.

Luo, H. and Lu, S. “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks”, IEEE/ACM Transactions on Networking.(2004). vol. 12, no. 6, pp. 1049-1063.

Luo, H., Zerfos, P., Kong, J., Lu, S., and Zhang, L, “Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks”.Proceeding of The 9th International Conference on Network Protocols,(2001).

Capkun, S., Buttya, L., and Hubaux, P.” Self-Organized Public Key Management for Mobile Ad Hoc Networks”, IEEE Trans. Mobile Computing, (2003) vol. 2, no. 1, pp. 52-64.

Shushan Zhao, “Application of Identity-Based Cryptography in Mobile Ad Hoc Networks” ACM Transactions on Computational Logic, Vol.2007.

J. Baek, Newmarch, Jan, Safavi-Naini,Reihaneh, and Susilo, Willy, “A survey of identity-based cryptography”, AUUG'2004.

F.Mjølsnes, C. Rong P. Spilling,” Evaluation of Key Management in adhoc Networks for Emergency and Rescue Operations”.

Bing Wu, Jie Wu and Mihaela Cardei, “A Survey of Key Management in Mobile Ad Hoc Networks”, Handbook of research on wireless security.

Chan, A. (2004),”Distributed Symmetric Key Management for MobileAdhoc Networks”, IEEE INFOCOM.

Chan, H., Perrig, A., and Song, D. (2003),” Random Key Predistribution Schemes for Sensor Networks”. To appear in Proc. of the IEEE Security and Privacy Symposium.

Chan, H. and Perrig, A. (2005). “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks”, In Proceedings of IEEE INFOCOM.

D. Balfanz, Smetters, D. K., Stewart, Paul, and Wong, H. Chi, “Talking to stranger Authentication in ad-hoc wireless networks” Network and Distributed System Security Symposium”, 2002.

Seung Yi, Robin Kravets, “MOCA : Mobile Certificate Authority for Wireless AdHoc Networks”, Department of Computer Science University of Illinois at Urbana-Champaign


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.