A survey on key management of identity-based schemes in mobile Ad Hoc networks

被引:0
|
作者
机构
[1] Zhao, Kuo
[2] Huang, Longhe
[3] Li, Hongtu
[4] Wu, Fangming
[5] Chu, Jianfeng
[6] Hu, Liang
基金
中国国家自然科学基金;
关键词
Mobile security;
D O I
10.12720/jcm.8.11.768-779
中图分类号
学科分类号
摘要
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key generation and distribution. Subsequently, to build a more secure identity-based scheme for MANET, we recommend some techniques to improve security and availability of its key management. Finally, we point out some problems of identity-based schemes in MANETs, which are not addressed and we will explore in the future. © 2013 Engineering and Technology Publishing.
引用
收藏
相关论文
共 50 条
  • [31] Hybrid key management for mobile ad hoc networks
    Sanchez, DS
    Baldus, H
    CHALLENGES IN AD HOC NETWORKING, 2006, 197 : 337 - +
  • [32] Distributive key management for mobile ad hoc networks
    Al-Shurman, Mohammad
    Yoo, Seong-Moo
    Kim, Bonam
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 533 - +
  • [33] Robust key management for mobile ad hoc networks
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    不详
    Qinghua Daxue Xuebao, 2008, 7 (1194-1197):
  • [34] A framework for key management in mobile ad hoc networks
    Hadjichristofi, GC
    Adams, WJ
    Davis, NJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 568 - 573
  • [35] Identity-based secure collaboration in wireless ad hoc networks
    Pan, Jianping
    Cai, Lin
    Shen, Xuemin
    Mark, Jon W.
    COMPUTER NETWORKS, 2007, 51 (03) : 853 - 865
  • [36] An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks
    Zhang, Leyou
    Hu, Yupu
    Mu, Ningbo
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1619 - +
  • [37] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [38] Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Khalil, Ayman
    Hasbullah, Iznan Husainy
    IEEE ACCESS, 2021, 9 : 121522 - 121531
  • [39] Dynamic key management schemes for secure group communication based on hierarchical clustering in mobile ad hoc networks
    Tsaur, Woei-Jiunn
    Pai, Haw-Tyng
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 475 - +
  • [40] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583