Mixed key management using hamming distance for mobile ad-hoc networks

Seok Lae Lee, In Kyung Jeun, Joo Seok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Unlike fixed networks, mobile ad-hoc networks have diverse characteristics, such as dynamic topologies, bandwidth-constrained links, energy-constrained operation, limited physical security, etc. Due to these characteristics their security requirements are different from those of fixed networks. This paper presents a method of authenticating the nodes in the ad-hoc network and securely transmitting information in consideration of the characteristics of the mobile ad hoc network. To this end, this paper proposes a method of combining asymmetric and symmetric cryptography to enhance the efficiency of secret key management for authentication and secure channel establishment. In particular, this paper proposes a method that introduces the concept of Hamming Distance to share the secret keys between the nodes. According to this proposal, secure communication between the nodes is possible when one node manages only log 2N secret keys.

Original languageEnglish
Title of host publicationComputational Science - ICCS 2007 - 7th International Conference, Proceedings
PublisherSpringer Verlag
Number of pages8
EditionPART 2
ISBN (Print)9783540725855
Publication statusPublished - 2007
Event7th International Conference on Computational Science, ICCS 2007 - Beijing, China
Duration: 2007 May 272007 May 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume4488 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other7th International Conference on Computational Science, ICCS 2007

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Mixed key management using hamming distance for mobile ad-hoc networks'. Together they form a unique fingerprint.

Cite this