Securing Mobile Ad Hoc Networks with Certificateless Public Keys
- 13 November 2006
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Dependable and Secure Computing
- Vol. 3 (4), 386-399
- https://doi.org/10.1109/tdsc.2006.58
Abstract
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETsKeywords
This publication has 31 references indexed in Scilit:
- Hardware accelerators for pairing based cryptosystemsIEE Proceedings - Information Security, 2005
- URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc NetworksIEEE/ACM Transactions on Networking, 2004
- Efficient identity-based security schemes for ad hoc network routing protocolsAd Hoc Networks, 2004
- On the Selection of Pairing-Friendly GroupsLecture Notes in Computer Science, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- The Sybil AttackLecture Notes in Computer Science, 2002
- Securing ad hoc networksIEEE Network, 1999
- How to share a secretCommunications of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970