The Repository @ St. Cloud State

Open Access Knowledge and Scholarship

Date of Award

12-2007

Culminating Project Type

Starred Paper

Degree Name

Computer Science: M.S.

Department

Computer Science and Information Technology

College

School of Science and Engineering

First Advisor

Jayantha Herath

Second Advisor

Donald Hamnes

Third Advisor

Susantha Herath

Keywords and Subject Headings

key generation, key management

Abstract

A key is the most important part of any cryptographic algorithm. Since the cryptographic algorithm is publicly available, ensuring that the key is kept confidential is very important. Key management is an area that deals with key generation, key distribution, key storage, key change and key destruction. It is an important concern for both secure wired and wireless communications. It is one of the major challenges in case of wireless networks because of the lack of any fixed infrastructure and dynamic nature of the ad hoc networks. In this paper I will be doing a survey on various key management techniques available in wireless networks. Then I will compare these techniques on various factors such as security, communication cost, computation cost, etc. Also, I will be discussing various key management schemes available in databases for storing and retrieving the data.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.