A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks

被引:0
|
作者
Dahshan, Hisham [1 ]
Irvine, James [1 ]
机构
[1] Univ Strathclyde, Dept Elect & Elect Engn, Glasgow G1 1XQ, Lanark, Scotland
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure, shared wireless medium, stringent resource constraints and highly dynamic topology. Key management is a central aspect for security in mobile ad hoc networks. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks. Trust establishment and management are essential for any security framework of MANETs. Threshold cryptography has proved to be an effective scheme for key management and distribution. In this paper we propose a trust based threshold cryptography key management scheme for MANETs. In the proposed scheme, threshold cryptography supports security association establishment between mobile nodes in a web of trust. It enables the source and the destination nodes to successfully complete a certificate chain discovery even if the number of trusted nodes in the neighborhood of the requesting nodes is very low. The advantages of the proposed scheme are justified through extensive simulations.
引用
收藏
页码:1090 / 1094
页数:5
相关论文
共 50 条
  • [1] Trust threshold based public key management in mobile ad hoc networks
    Cho, Jin-Hee
    Chen, Ing-Ray
    Chan, Kevin S.
    [J]. AD HOC NETWORKS, 2016, 44 : 58 - 75
  • [2] Threshold cryptography in mobile ad hoc networks
    Di Crescenzo, G
    Arce, G
    Ge, RW
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 91 - 104
  • [3] Key Management in Web of Trust for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 363 - 370
  • [4] Identity-based and threshold key management in mobile ad hoc networks
    Li, Jingfeng
    Wei, Dawei
    Kou, Hongzhao
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 795 - 798
  • [5] A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load
    Nguyen, HN
    Morino, H
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 905 - 915
  • [6] Trust Management in Mobile Ad Hoc Networks
    Chatzidakis, Michail
    Hadjiefthymiades, Stathes
    [J]. 2014 16TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), 2014,
  • [7] Public String based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
    Chauhan, Gargi K.
    Patel, Saurabh M.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1257 - 1261
  • [8] A trust cluster based key management protocol for ad hoc networks
    Xu Li
    Zhang Jing
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 370 - +
  • [9] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583
  • [10] Identity-Based Threshold Key Management for Ad Hoc Networks
    Zhang, Yuchen
    Liu, Jing
    Wang, Yadi
    Han, Jihong
    Wang, Hengjun
    Wang, Kun
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1753 - 1757