Key management in ad hoc networks using self-certified public key system

被引:1
|
作者
Fagen, Li [1 ]
Xiangjun, Xin [2 ]
Yupu, Hu [1 ]
机构
[1] Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an
[2] Department of Information and Computing Science, Zhengzhou University of Light Industry, Zhengzhou
关键词
Ad hoc network; Key management; Network security; Self-certified public key system;
D O I
10.1504/IJMC.2007.011491
中图分类号
学科分类号
摘要
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the self-certified public key system and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organising way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The using of self-certified public key system has the following advantages: (1) the storage space and the communication overheads can be reduced in that the certificate is unnecessary; (2) the computational costs can be decreased since it requires no public key verification; (3) there is no key escrow problem since the Certificate Authority (CA) does not know the users' private keys. As compared with the previous works, which were implemented with the certificate-based public key system and identity-based (ID-based) public key system, the proposed approach is more secure and efficient. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:94 / 106
页数:12
相关论文
共 50 条
  • [41] A Clustering-based Scalable Key Management Protocol for Ad Hoc Networks
    Maghmoumi, Chadi
    Abouaissa, Hafid
    Gaber, Jaafar
    Lorenz, Pascal
    2009 SECOND INTERNATIONAL CONFERENCE ON COMMUNICATION THEORY, RELIABILITY, AND QUALITY OF SERVICE, 2009, : 42 - +
  • [42] Power proximity based key management for secure multicast in ad hoc networks
    Lazos, Loukas
    Poovendran, Radha
    WIRELESS NETWORKS, 2007, 13 (01) : 127 - 148
  • [43] A scalable key management and clustering scheme for wireless ad hoc and sensor networks
    Li, Jason H.
    Bhattacharjee, Bobby
    Yu, Miao
    Levy, Renato
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2008, 24 (08): : 860 - 869
  • [44] A secure group key management scheme for hierarchical mobile ad hoc networks
    Huang, Dijiang
    Medhi, Deep
    AD HOC NETWORKS, 2008, 6 (04) : 560 - 577
  • [45] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [46] Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
    Zhou J.
    Liu H.
    Zhou Y.
    Lyu Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 63 - 68
  • [47] Power proximity based key management for secure multicast in ad hoc networks
    Loukas Lazos
    Radha Poovendran
    Wireless Networks, 2007, 13 : 127 - 148
  • [48] Threshold and Identity Based Group Key Management Protocols in Ad Hoc Networks
    Zhang, Jianmin
    Li, Jian
    ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 127 - 130
  • [49] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [50] A Self-Organized Key Management Scheme for Ad Hoc Networks Based on Identity-Based Cryptography
    Pura, Mihai Lica
    Buchs, Didier
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,