A survey on key management of identity-based schemes in mobile Ad Hoc networks

被引:0
|
作者
机构
[1] Zhao, Kuo
[2] Huang, Longhe
[3] Li, Hongtu
[4] Wu, Fangming
[5] Chu, Jianfeng
[6] Hu, Liang
基金
中国国家自然科学基金;
关键词
Mobile security;
D O I
10.12720/jcm.8.11.768-779
中图分类号
学科分类号
摘要
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key generation and distribution. Subsequently, to build a more secure identity-based scheme for MANET, we recommend some techniques to improve security and availability of its key management. Finally, we point out some problems of identity-based schemes in MANETs, which are not addressed and we will explore in the future. © 2013 Engineering and Technology Publishing.
引用
收藏
相关论文
共 50 条
  • [1] Key revocation for identity-based schemes in mobile ad hoc networks
    Hoeper, Katrin
    Gong, Guang
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2006, 4104 : 224 - 237
  • [2] Identity-based and threshold key management in mobile ad hoc networks
    Li, Jingfeng
    Wei, Dawei
    Kou, Hongzhao
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 795 - 798
  • [3] IDENTITY-BASED KEY MANAGEMENT IN MOBILE AD HOC NETWORKS: TECHNIQUES AND APPLICATIONS
    Da Silva, Eduardo
    Dos Santos, Aldri L.
    Albini, Luiz Carlos P.
    Lima, Michele N.
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) : 46 - 52
  • [4] Identity-based key distribution for mobile Ad Hoc networks
    Xixiang Lv
    Hui Li
    Baocang Wang
    Frontiers of Computer Science in China, 2011, 5 : 442 - 447
  • [5] Identity-based key distribution for mobile Ad Hoc networks
    Lv, Xixiang
    Li, Hui
    Wang, Baocang
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (04): : 442 - 447
  • [6] Identity-Based Threshold Key Management for Ad Hoc Networks
    Zhang, Yuchen
    Liu, Jing
    Wang, Yadi
    Han, Jihong
    Wang, Hengjun
    Wang, Kun
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1753 - 1757
  • [7] Survey on Certificateless Key Management Schemes in Mobile Ad Hoc Networks
    Liu, Qi
    Bai, Xiangyu
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 334 - 339
  • [8] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [9] A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
    Zhao, Shushan
    Aggarwal, Akshai
    Frost, Richard
    Bai, Xiaole
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 380 - 400
  • [10] Short paper: Limitations of key escrow in identity-based schemes in ad hoc networks
    Hoeper, K
    Gong, G
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 403 - 405