Vis enkel innførsel

dc.contributor.authorHegland, Anne Marie
dc.contributor.authorWinjum, Eli
dc.contributor.authorMjølsnes, Stig Frode
dc.contributor.authorRong, Chunming
dc.contributor.authorKure, Øivind
dc.contributor.authorSpilling, Pål
dc.date.accessioned2017-11-14T15:37:56Z
dc.date.available2017-11-14T15:37:56Z
dc.date.created2007-01-08T11:15:12Z
dc.date.issued2006
dc.identifier.citationIEEE Communications Surveys and Tutorials. 2006, 8 (3), 48-66.nb_NO
dc.identifier.issn1553-877X
dc.identifier.urihttp://hdl.handle.net/11250/2466282
dc.description.abstractThe wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. A main challenge is to judge whether or not a routing message originates from a trustworthy node. The solution thus far is cryptographically signed messages. The general assumption is that nodes in possession of a valid secret key can be trusted. Consequently, a secure and efficient key-management scheme is crucial. Keys are also required for protection of application data. However, the focus here is on network-layer management information. Whereas keymanagement schemes for the upper layers can assume an already running network service, schemes for the protection of the network layer cannot. Keys are a prerequisite to bootstrap a protected network service. This article surveys the state of the art within key management for ad hoc networks, and analyzes their applicability for network-layer security. The analysis puts some emphasis on their applicability in scenarios such as emergency and rescue operations, as this work was initiated by a study of security in MANETs for emergency and rescue operations.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.titleSurvey of Key Management in Ad Hoc Networksnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber48-66nb_NO
dc.source.volume8nb_NO
dc.source.journalIEEE Communications Surveys and Tutorialsnb_NO
dc.source.issue3nb_NO
dc.identifier.doi10.1109/COMST.2006.253271
dc.identifier.cristin376157
dc.description.localcode© 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,30,0
cristin.unitcode194,63,1,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.unitnameIE fakultetsadministrasjon
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel