Sunteți pe pagina 1din 3

Authors

Key Management Scheme

Techniques

Advantages

Disadvantages

Remarks

Tseng [24]

heterogeneous-

Secure

Improving security infrastructure public management scheme, identity confirmation, node of key

N/A

Widecovered heterogeneou s Networks are used for

network aided certificate public-key management scheme distribution, symmetric secret key

experiments

Haitao[21]

Cluster based Id-based and Secure, fault N/A key management scheme hierarchical group tolerant, and delay

A MANET is considered for experiments where nodes are assumed to be roaming from one sub group another group to sub

key expansive, efficient,

management

rekeying policy

Cho et al. Threshold [22] secret (TSS)

Cryptographi More security

The

proposed Security achieved not MANET without having central CA

is in

sharing cally Generated Address (CGA)

mechanisms were evaluated.

Cardone et al. [6]

Reliable

LQI

link Effectiveness providing security

in

Experiments are made large

communication quality for MANET- assessment

under

over

WSN scenarios

mobility challenging channel contention

and

scale deployments of MANETs

Devaraju and

QoS secure

based Dynamic clustering key approach

Better performance

QoS N/A in

NS2 version ns-allinone2.33 used perform simulations was to

Ganapath multicast i [40] distribution

terms of packet loss rate, key ratio,

delivery energy

consumption and end-to-end delay Sanghavi Cluster based Cryptographi Prevention of Reliability of Experiments

and Tada topology based c method and impersonation [43] secure distribution key network coding approach attacks, eavesdropping, authentication and confidentiality, less communication overhead Deng, Mukharji and Agarwal[ 23] Threshold and Distributed identity based key key management management and authenticatio n Saves

key distribution are made in has not been cluster-based evaluated ad hoc

hierarchical network topology

network N/A and

Distributed key generation and based Authenticatio n is the two important features of identity

bandwidth, computational power

besides

providing end-toend confidentiality and authenticity

the research. Zhu et al. GKMPAN [44] Probabilistic Efficiency, It (with scalability has It is a group key management

key sharing scalability scheme. less nodes),

revoked problem

and especially when protocol number of evaluated in

partially stateless

revoked nodes MANETs. exist

S-ar putea să vă placă și