A survey on key management of identity-based schemes in mobile Ad Hoc networks

被引:0
|
作者
机构
[1] Zhao, Kuo
[2] Huang, Longhe
[3] Li, Hongtu
[4] Wu, Fangming
[5] Chu, Jianfeng
[6] Hu, Liang
基金
中国国家自然科学基金;
关键词
Mobile security;
D O I
10.12720/jcm.8.11.768-779
中图分类号
学科分类号
摘要
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key generation and distribution. Subsequently, to build a more secure identity-based scheme for MANET, we recommend some techniques to improve security and availability of its key management. Finally, we point out some problems of identity-based schemes in MANETs, which are not addressed and we will explore in the future. © 2013 Engineering and Technology Publishing.
引用
收藏
相关论文
共 50 条
  • [41] Threshold and Identity Based Group Key Management Protocols in Ad Hoc Networks
    Zhang, Jianmin
    Li, Jian
    ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 127 - 130
  • [42] Trust threshold based public key management in mobile ad hoc networks
    Cho, Jin-Hee
    Chen, Ing-Ray
    Chan, Kevin S.
    AD HOC NETWORKS, 2016, 44 : 58 - 75
  • [43] Energy and Mobility Based Group Key Management in Mobile Ad Hoc Networks
    Priyadharshini, M. Ramya
    Prasanna, S.
    Balaji, N.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [44] A Group-Based Key Management Protocol for Mobile Ad Hoc Networks
    Chen, Qing
    Lin, Xiaodong
    Shen, Sherman
    Hashimoto, Kazuo
    Kato, Nei
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4305 - +
  • [45] A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1090 - 1094
  • [46] Distributed symmetric key management for mobile ad hoc networks
    Chan, ACF
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
  • [47] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [48] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [49] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [50] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182