A Certificateless Key Management Scheme in Moblie Ad Hoc Networks

被引:0
作者
Li, Lu [1 ]
Wang, Ze [1 ]
Liu, Wenju [1 ]
Wang, Yunlong [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
来源
2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2011年
关键词
key management; MANETs; CL-PKC; threshold cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key management plays an important role in the security of today's information technology, especially in wireless and mobile environments like mobile ad hoc networks (MANETs) in which key management has received more and more attention for the difficulty to be implemented in such dynamic network. Traditional key management schemes are mainly based on PKI and identity-based public key cryptography (ID-PKC), which suffers from the computational costs of certificate verification and the key escrow problem. In this paper, we present a novel distributed key management scheme, a combination of certificateless public key cryptography (CL-PKC) and threshold cryptography, which not only eliminates the need for certificate-based public key distribution and the key escrow problem but also prevents single point of failure.
引用
收藏
页数:4
相关论文
共 13 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] Self-organized public-key management for mobile ad hoc networks
    Capkun, S
    Buttyán, L
    Hubaux, JP
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) : 52 - 64
  • [3] DENG H., 2004, Ad Hoc Networks, V2, P291
  • [4] Deng HM, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P107
  • [5] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
  • [6] Toward secure key distribution in Truly Ad-Hoc networks
    Khalili, A
    Katz, J
    Arbaugh, WA
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 342 - 346
  • [7] Khalili A., 2009, S APPL INT WORKSH, P342
  • [8] Kong JJ, 2001, NETWORK PROTOCOLS, P251, DOI 10.1109/ICNP.2001.992905
  • [9] Liu D., 2003, PROC 10 ACM C COMPUT, P231, DOI DOI 10.1145/948109.948141
  • [10] Self-securing ad hoc wireless networks
    Luo, HY
    Zerfos, P
    Kong, HJ
    Lu, SW
    Zhang, LX
    [J]. ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 567 - 574