Key management in ad hoc networks using self-certified public key system

被引:1
|
作者
Fagen, Li [1 ]
Xiangjun, Xin [2 ]
Yupu, Hu [1 ]
机构
[1] Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an
[2] Department of Information and Computing Science, Zhengzhou University of Light Industry, Zhengzhou
关键词
Ad hoc network; Key management; Network security; Self-certified public key system;
D O I
10.1504/IJMC.2007.011491
中图分类号
学科分类号
摘要
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the self-certified public key system and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organising way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The using of self-certified public key system has the following advantages: (1) the storage space and the communication overheads can be reduced in that the certificate is unnecessary; (2) the computational costs can be decreased since it requires no public key verification; (3) there is no key escrow problem since the Certificate Authority (CA) does not know the users' private keys. As compared with the previous works, which were implemented with the certificate-based public key system and identity-based (ID-based) public key system, the proposed approach is more secure and efficient. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:94 / 106
页数:12
相关论文
共 50 条
  • [1] Key management scheme for ad hoc networks using self-certified public key system
    Hu, Rong-Lei
    Liu, Jian-Wei
    Zhang, Qi-Shan
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (06): : 943 - 947
  • [2] Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 116 - 126
  • [3] Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
    Choi, Daeseon
    Lee, Younho
    Park, Yongsu
    Jin, Seung-hun
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (11) : 3574 - 3583
  • [4] Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks
    李发根
    高军涛
    刘双根
    胡予濮
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 152 - 157
  • [5] A robust self-organized public key management for mobile ad hoc networks
    Dahshan, Hisham
    Irvine, James
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (01) : 16 - 30
  • [6] Key Management for Large Ad Hoc Networks
    Gao, Fengxiu
    Li, Guangsong
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [7] A key management scheme for Ad hoc networks
    Zeng Ping
    Hu Ronglei
    Fang Yong
    Yang Jianxi
    Liu Yue
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2609 - 2613
  • [8] The Design of a Secure Key Management System for Mobile Ad hoc Networks
    Boukerche, Azzedine
    Ren, Yonglin
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 309 - 316
  • [9] The Design of a Secure Key Management System in Vehicular Ad hoc Networks
    Chauhan, Kamal Kumar
    Kumar, Sumit
    Kumar, Suresh
    2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [10] A new key management method for ad hoc networks
    Liu, Chun
    Liu, Jianwel
    Zhang, Qishan
    CHINA COMMUNICATIONS, 2007, 4 (01) : 8 - 13