A Self-Organized Key Management Scheme for Ad Hoc Networks Based on Identity-Based Cryptography

被引:0
|
作者
Pura, Mihai Lica [1 ]
Buchs, Didier [1 ]
机构
[1] Univ Geneva, Ctr Univ Informat, Geneva, Switzerland
关键词
ad hoc networks; security; self-organization; key management; identity based cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ad hoc networks represent a very modern technology for providing communication between devices without the need of any prior infrastructure set up, and thus in an "on the spot" manner. But there is a catch: so far there isn't any security scheme that would suit the ad hoc properties of this type of networks and that would also accomplish the needed security objectives. The most promising proposals are the self-organized schemes. This paper presents a work in progress aiming at developing a new self-organized key management scheme that uses identity based cryptography for making impossible some of the attacks that can be performed over the schemes proposed so far, while preserving their advantages. The paper starts with a survey of the most important self-organized key management schemes and a short analysis of the advantages and disadvantages they have. Then, it presents our new scheme, and by using informal analysis, it presents the advantages it has over the other proposals.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [2] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [3] Identity-Based Threshold Key Management for Ad Hoc Networks
    Zhang, Yuchen
    Liu, Jing
    Wang, Yadi
    Han, Jihong
    Wang, Hengjun
    Wang, Kun
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1753 - 1757
  • [4] Identity-based and threshold key management in mobile ad hoc networks
    Li, Jingfeng
    Wei, Dawei
    Kou, Hongzhao
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 795 - 798
  • [5] Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks
    Huo Shiwei
    Tang Yubo
    Liu Shaojun
    Tian Balin
    [J]. 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 209 - 213
  • [6] Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks
    Reyes, Dakila, II
    Festin, Cedric Angelo M.
    Pancho-Festin, Susan
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 565 - 570
  • [7] A Novel Detective and Self-organized Certificateless Key Management Scheme in Mobile Ad Hoc Networks
    Zheng, Jun
    Xu, Sanchun
    Zhao, Fangfang
    Wang, Dianxin
    Li, Yuanjun
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 443 - 448
  • [8] Efficient self-organized key management for mobile ad hoc networks
    Erdem, OM
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2185 - 2190
  • [9] Towards a fully self-organized identity-based key management system for MANETs
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 717 - 723
  • [10] IDENTITY-BASED KEY MANAGEMENT IN MOBILE AD HOC NETWORKS: TECHNIQUES AND APPLICATIONS
    Da Silva, Eduardo
    Dos Santos, Aldri L.
    Albini, Luiz Carlos P.
    Lima, Michele N.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) : 46 - 52