A survey on key management of identity-based schemes in mobile Ad Hoc networks

被引:0
|
作者
机构
[1] Zhao, Kuo
[2] Huang, Longhe
[3] Li, Hongtu
[4] Wu, Fangming
[5] Chu, Jianfeng
[6] Hu, Liang
基金
中国国家自然科学基金;
关键词
Mobile security;
D O I
10.12720/jcm.8.11.768-779
中图分类号
学科分类号
摘要
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key generation and distribution. Subsequently, to build a more secure identity-based scheme for MANET, we recommend some techniques to improve security and availability of its key management. Finally, we point out some problems of identity-based schemes in MANETs, which are not addressed and we will explore in the future. © 2013 Engineering and Technology Publishing.
引用
收藏
相关论文
共 50 条
  • [21] Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography
    Mehr, Kemal Adli
    Niya, Javad Musevi
    ETRI JOURNAL, 2015, 37 (03) : 512 - 522
  • [22] Security bootstrapping of mobile ad hoc networks using identity-based cryptography
    Mehr, Kamal Adli
    Niya, Javad Musevi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1374 - 1383
  • [23] A SURVEY OF CLUSTERING SCHEMES FOR MOBILE AD HOC NETWORKS
    Yu, Jane Y.
    Chong, Peter H. J.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (01): : 32 - 48
  • [24] Towards a identity-based key management system for vehicular ad hoc network
    Hong, Chen
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 1359 - 1362
  • [25] Identity authentication and key agreement schemes for ad hoc networks
    Al-Fayoumi, Mohammad A.
    Aboud, Sattar J.
    Journal of Applied Sciences, 2007, 7 (12) : 1638 - 1642
  • [26] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    Computing, 2014, 96 : 843 - 853
  • [27] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    COMPUTING, 2014, 96 (09) : 843 - 853
  • [28] A SURVEY OF KEY MANAGEMENT IN AD HOC NETWORKS
    Hegland, Anne Marie
    Winjum, Eli
    Mjolsnes, Stig F.
    Rong, Chunming
    Kure, Oivind
    Spilling, Pal
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 48 - 66
  • [29] A survey on peer-to-peer key management for mobile ad hoc networks
    Van der Merwe, Johann
    Dawoud, Dawoud
    McDonald, Stephen
    ACM COMPUTING SURVEYS, 2007, 39 (01)
  • [30] Cluster Based Group Key Management in Mobile Ad hoc Networks
    Renuka, A.
    Shet, K. C.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 42 - 49