Key management in ad hoc networks using self-certified public key system

被引:1
|
作者
Fagen, Li [1 ]
Xiangjun, Xin [2 ]
Yupu, Hu [1 ]
机构
[1] Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an
[2] Department of Information and Computing Science, Zhengzhou University of Light Industry, Zhengzhou
关键词
Ad hoc network; Key management; Network security; Self-certified public key system;
D O I
10.1504/IJMC.2007.011491
中图分类号
学科分类号
摘要
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the self-certified public key system and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organising way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The using of self-certified public key system has the following advantages: (1) the storage space and the communication overheads can be reduced in that the certificate is unnecessary; (2) the computational costs can be decreased since it requires no public key verification; (3) there is no key escrow problem since the Certificate Authority (CA) does not know the users' private keys. As compared with the previous works, which were implemented with the certificate-based public key system and identity-based (ID-based) public key system, the proposed approach is more secure and efficient. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:94 / 106
页数:12
相关论文
共 50 条
  • [21] A Certificateless Key Management Scheme in Moblie Ad Hoc Networks
    Li, Lu
    Wang, Ze
    Liu, Wenju
    Wang, Yunlong
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [22] Research on Key Management Schemes for Mobile Ad Hoc Networks
    Han Lei
    Liu Ji-qiang
    Han Zhen
    Wei Xue-ye
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 225 - +
  • [23] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [24] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [25] Key agreement in ad hoc networks
    Asokan, N
    Ginzboorg, P
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1627 - 1637
  • [26] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [27] Key management based on hierarchical secret sharing in ad-hoc networks
    Ma, Chuangui
    Cheng, Rui
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 182 - 191
  • [28] Ad hoc key management infrastructure
    Lehane, B
    Dolye, L
    O'Mahony, D
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 540 - 545
  • [29] Mixed key management using Hamming Distance for mobile ad-hoc networks
    Lee, Seok-Lae
    Jeun, In-Kyung
    Song, Joo-Seok
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 665 - +
  • [30] A key management and authentication model for Ad hoc network
    Liu, Jianwei
    Liu, Chun
    Guo, Keqiang
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 318 - 322