Identity-Based Threshold Key Management for Ad Hoc Networks
- 1 December 2008
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2, 797-801
- https://doi.org/10.1109/paciia.2008.211
Abstract
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no aid of any established infrastructure, which, however, is commonly susceptible to various attacks. The relevant researches for ad hoc networks have been currently focused on these aspects mentioned above to further solve various security problems. In this contribution, we briefly survey previous works regarding key management for ad hoc networks, and then introduce the secret sharing and pairing technique related to this point. Following this lead, we further propose an identity-based threshold key management scheme for ad hoc networks, which includes key generation, key distribution, and key update services. Moreover, we also evaluate the performance of above scheme.Keywords
This publication has 11 references indexed in Scilit:
- An efficient heterogeneous key management approach for secure multicast communications in ad hoc networksTelecommunication Systems, 2008
- Identity-based ring signatures from RSATheoretical Computer Science, 2007
- A hierarchical key management scheme for secure group communications in mobile ad hoc networksJournal of Systems and Software, 2007
- Identity-based secure collaboration in wireless ad hoc networksComputer Networks, 2006
- Securing reliable server pooling in MANET against byzantine adversariesIEEE Journal on Selected Areas in Communications, 2006
- TIDS: threshold and identity-based security scheme for wireless ad hoc networksAd Hoc Networks, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystemsIEEE Transactions on Information Theory, 1999
- Securing ad hoc networksIEEE Network, 1999
- Reducing elliptic curve logarithms to logarithms in a finite fieldIEEE Transactions on Information Theory, 1993