PKIM:: A public key infrastructure for Mobile ad hoc network

被引:0
|
作者
Miao, FY [1 ]
Xiong, Y [1 ]
Yang, SB [1 ]
Wang, XF [1 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci & Technol, Hefei 230027, Peoples R China
关键词
Mobile ad hoc network; key management; one-way hash chain;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The distribution and autonomy of Mobile ad hoc network (Manet) exclude the deployment of the Public key infrastructure (PKI) with an online Trusted third party (TTP). Allowing for the characteristics of Manet such as transience, distribution and autonomy, the paper proposes a one-way hash chain based Public key infrastructure for manet (PKIM). In the scheme, a node, before coming into a Manet, first acquires a certificate offline from its manufacturer, and then the certificate can be initialized at any time to use, refreshed and revoked by the node itself based on time synchronization and one-way hash chain. Discussions show that the PKIM can exempt any support of TTP and manufacturer, and remove the limitation of life period on certificate if parameters are properly selected. Thus, the scheme is secure, TTP-free, flexible and suitable for Manet.
引用
收藏
页码:594 / 598
页数:5
相关论文
共 50 条
  • [1] Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing
    Hao, Liming
    Li, Xiehua
    Yang, Shutang
    Lu, Songnian
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 910 - 913
  • [2] Protocols for supporting a public key infrastructure in ad hoc networks
    Burmester, M
    Yasinsac, A
    [J]. SECURITY PROTOCOLS, 2005, 3364 : 274 - 287
  • [3] A distributed key generation for mobile Ad Hoc network
    Liu, Linqiang
    Song, Rushun
    Zhang, Lihua
    [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (06): : 181 - 182
  • [4] Reputation based self organized public key management for mobile ad hoc network
    Choi, D
    Jin, S
    Yoon, H
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 331 - 335
  • [5] Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks
    Misra, Sudip
    Goswami, Sumit
    Pathak, Gyan Prakash
    Shah, Nirav
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 146 - 162
  • [6] AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks
    Zhang, YC
    Liu, W
    Lou, WJ
    Fang, YG
    Kwon, YG
    [J]. ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3515 - 3519
  • [7] Public-key management in mobile ad hoc networks
    Lin, Haifeng
    Jiang, Anna
    Bai, Di
    Liu, Yunfei
    [J]. PIAGENG 2013: INTELLIGENT INFORMATION, CONTROL, AND COMMUNICATION TECHNOLOGY FOR AGRICULTURAL ENGINEERING, 2013, 8762
  • [8] COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS
    Wasef, Albert
    Lu, Rongxing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) : 22 - 28
  • [9] Ad hoc key management infrastructure
    Lehane, B
    Dolye, L
    O'Mahony, D
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 540 - 545
  • [10] A Mobile Ad hoc Network Public Key Encryption Algorithm based on Hash-chain
    Wang Feng
    Shang Qing-wei
    Cao Ke
    [J]. PEEA 2011, 2011, 23