A PUBLIC KEY MANAGEMENT SCHEME AND THRESHOLD-MULTISIGNATURE SCHEME FOR MOBILE AD HOC NETWORKS

被引:0
|
作者
van der Merwe, J. [1 ]
Dawoud, D. S. [1 ]
McDonald, S. [1 ]
机构
[1] Univ KwaZulu Natal, Sch Elect Elect & Comp Engn, King George V Ave, ZA-4041 Durban, South Africa
来源
SAIEE AFRICA RESEARCH JOURNAL | 2006年 / 97卷 / 01期
关键词
Mobile ad hoc networks; security; pairwise key management; public key cryptography; self-certified public keys; self-certificates; group-oriented cryptography; threshold-multisignatures;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a threshold-multisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of shareholders with threshold t, to sign an arbitrary message on behalf of the group. The group signature is publicly verifiable and allows any outsider to establish the identity of the individual signers. The paper proposes a self-certified public key issuing protocol that allows negotiation between a single entity and a distributed certificate authority for an implicit self-certified public key. The main objective of the paper is to find a key management scheme that is suitable for mobile ad hoc networks. As a solution, the paper proposes a public key management scheme, called Ad Hoc Public Key Management (AdHocPKM). AdHocPKM integrates the advantages of distributed key generation, threshold-multisignatures, self-certified public keying and self-certificates to yield a secure, trustworthy key management service with a high availability feature. The proposed scheme is operated solely by the end-users and does not require any offline trusted third party or a priori sharing of keying material. This addresses the major problem in providing key management services for mobile ad hoc networks, without compromising security.
引用
收藏
页码:82 / 92
页数:11
相关论文
共 50 条
  • [1] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [2] A secure hierarchical key management scheme in mobile ad hoc networks
    Shi, Rong-Hua
    Yuan, Qian
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (01): : 201 - 206
  • [3] Distributed Hierarchical Key Management Scheme in Mobile Ad Hoc Networks
    Wang, Fei
    Yu, F. Richard
    Srinivasan, Anand
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1958 - 1962
  • [4] A secure group key management scheme in mobile ad hoc networks
    Li, J
    Cui, GH
    Fu, XQ
    Liu, ZY
    Su, L
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1156 - 1159
  • [5] A key management scheme for Ad hoc networks
    Zeng Ping
    Hu Ronglei
    Fang Yong
    Yang Jianxi
    Liu Yue
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2609 - 2613
  • [6] A fully distributed proactively secure threshold-multisignature scheme
    van der Merwe, Johann
    Dawoud, Dawoud S.
    McDonald, Stephen
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (04) : 562 - 575
  • [7] Secure and robust threshold key management (SRKM) scheme for ad hoc networks
    Hamouid, K.
    Adi, K.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 517 - 534
  • [8] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [9] Trust threshold based public key management in mobile ad hoc networks
    Cho, Jin-Hee
    Chen, Ing-Ray
    Chan, Kevin S.
    [J]. AD HOC NETWORKS, 2016, 44 : 58 - 75
  • [10] Robust Key Management Scheme for Certification in Mobile Ad-hoc Networks
    Hamouid, K.
    Adi, K.
    [J]. ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 354 - +