Energy-efficient and non-interactive self-certification in MANETs

被引:0
作者
Yi, Jeong Hyun
机构
来源
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS | 2006年 / 4280卷
关键词
security protocol; self-configuration; threshold cryptography; authentication; key management;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANETs) have many well-known applications in military settings as well as in emergency and rescue operations. However, lack of infrastructure and lack of centralized control make MANETs inherently insecure, and therefore specialized security services are needed for their deployment. Self- certification is an essential and fundamental security service in MANETs. It is needed to securely cope with dynamic membership and topology and to bootstrap other important security primitives and services without the assistance of any centralized trusted authority. An ideal protocol must involve minimal interaction among the MANET nodes, since connectivity can be unstable. Also, since MANETs are often composed of weak or resource-limited devices, self-certification protocol must be efficient in terms of computation and communication. Unfortunately, previously proposed protocols are far from being ideal. In this paper, we propose fully non-interactive self-certification protocol based on bi-variate polynomial secret sharing and threshold BLS signature techniques. In contrast with prior work, our techniques do not require any interaction and do not involve any costly reliable broadcast communication among MANET nodes. We thoroughly analyze our proposal and show that it compares favorably to previous mechanisms.
引用
收藏
页码:533 / 547
页数:15
相关论文
共 26 条
  • [1] Energy aware lossless data compression
    Barr, K
    Asanovic, K
    [J]. PROCEEDINGS OF MOBISYS 2003, 2003, : 231 - 244
  • [2] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [3] Blundo C., 1993, LNCS, V740, P471
  • [4] Boldyreva A, 2003, LECT NOTES COMPUT SC, V2567, P31
  • [5] Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
  • [6] BONEH D, 2001, LNCS, V2139
  • [7] Bracha Gabriel, 1984, 3rd Annual Symposium on Principles of Distributed Computing (PODC 1984), P154
  • [8] Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
  • [9] The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    Frey, G
    Müller, M
    Rück, HG
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (05) : 1717 - 1719
  • [10] Gennaro R, 1999, LECT NOTES COMPUT SC, V1592, P295