Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks

被引:0
|
作者
Li, Fagen [1 ]
Shirase, Masaaki [1 ]
Takagi, Tsuyoshi [1 ]
机构
[1] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
来源
关键词
Ad hoc network; network security; key management; certificateless public key cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes. Without ally assumption of prefixed trust, relationship between nodes, the, ad hoc network works in a self-organizing way to provide, the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. Certificateless public key cryptography is applied here not only to eliminate the lived for certificates, but also to retain the desirable properties of identity-based key management approaches without the inherent key escrow problem.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [21] Overview the key management in ad hoc networks
    del Valle, G
    Cárdenas, RG
    [J]. ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 397 - 406
  • [22] An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
    Luo, Ming
    Zhao, Hong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (02) : 779 - 798
  • [23] An Improved Certificateless Public Key Authentication Scheme for Mobile Ad Hoc Networks Over Elliptic Curves
    Kasra-Kermanshahi, Shabnam
    Salleh, Mazleena
    [J]. PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 327 - 334
  • [24] An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
    Ming Luo
    Hong Zhao
    [J]. Wireless Personal Communications, 2015, 81 : 779 - 798
  • [25] AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks
    Zhang, YC
    Liu, W
    Lou, WJ
    Fang, YG
    Kwon, YG
    [J]. ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3515 - 3519
  • [26] An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1577 - 1582
  • [27] A public key algorithm for ad-hoc networks
    Carbunar, B
    Grama, A
    Vitek, J
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 319 - 320
  • [28] A method for fast revocation of certificateless public key cryptography
    Ibrahim, Ibrahim I.
    Ibrahim, Maged H.
    Allam, Ali M.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 250 - +
  • [29] A Novel Detective and Self-organized Certificateless Key Management Scheme in Mobile Ad Hoc Networks
    Zheng, Jun
    Xu, Sanchun
    Zhao, Fangfang
    Wang, Dianxin
    Li, Yuanjun
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 443 - 448
  • [30] Trust threshold based public key management in mobile ad hoc networks
    Cho, Jin-Hee
    Chen, Ing-Ray
    Chan, Kevin S.
    [J]. AD HOC NETWORKS, 2016, 44 : 58 - 75