Key management in ad hoc networks using self-certified public key system

被引:1
|
作者
Fagen, Li [1 ]
Xiangjun, Xin [2 ]
Yupu, Hu [1 ]
机构
[1] Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an
[2] Department of Information and Computing Science, Zhengzhou University of Light Industry, Zhengzhou
关键词
Ad hoc network; Key management; Network security; Self-certified public key system;
D O I
10.1504/IJMC.2007.011491
中图分类号
学科分类号
摘要
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the self-certified public key system and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organising way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The using of self-certified public key system has the following advantages: (1) the storage space and the communication overheads can be reduced in that the certificate is unnecessary; (2) the computational costs can be decreased since it requires no public key verification; (3) there is no key escrow problem since the Certificate Authority (CA) does not know the users' private keys. As compared with the previous works, which were implemented with the certificate-based public key system and identity-based (ID-based) public key system, the proposed approach is more secure and efficient. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:94 / 106
页数:12
相关论文
共 50 条
  • [31] Complex Threshold Key Management for Ad Hoc Network
    GUO Wei 1
    2. State Key Laboratory of Software Engineering
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 132 - 136
  • [32] Complex threshold key management for Ad hoc network
    Guo, Wei
    Xiong, Zhong-Wei
    Li, Zhi-Tang
    Wuhan University Journal of Natural Sciences, 2005, 10 (01) : 132 - 136
  • [33] An architecture for key management in hierarchical mobile ad-hoc networks
    Rhee, KH
    Park, YH
    Tsudik, G
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2004, 6 (02) : 156 - 162
  • [34] Efficient and robust key management for large mobile ad hoc networks
    Zhu, B
    Bao, F
    Deng, RH
    Kankanhalli, MS
    Wang, G
    COMPUTER NETWORKS, 2005, 48 (04) : 657 - 682
  • [35] Survey on Certificateless Key Management Schemes in Mobile Ad Hoc Networks
    Liu, Qi
    Bai, Xiangyu
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 334 - 339
  • [36] A hierarchical key management scheme for secure group communications in mobile ad hoc networks
    Wang, Nen-Chung
    Fang, Shian-Zhang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1667 - 1677
  • [37] Strategy and Simulation of Trust Cluster Based Key Management Protocol for Ad hoc Networks
    Xu, Li
    Wang, Xiaoding
    Shen, Jinbo
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 269 - 274
  • [38] An authenticated key agreement protocol for mobile ad hoc networks
    Zou, Xukai
    Thukral, Amandeep
    Ramamurthy, Byrav
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 509 - +
  • [39] Completely Self-Organization Ad hoc Networks Key Management Scheme based on Elliptic Curve
    Song, Shouyun
    Xu, Junpeng
    Yang, Shuai
    Cong, Qing
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 271 - 274
  • [40] A key management scheme combined with intrusion detection for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Luan, Liangyu
    Li, Guorui
    Rong, Wang
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 584 - +