TKGS: Verifiable threshold-based key generation scheme in open wireless ad hoc networks

被引:0
|
作者
Moharrum, M [1 ]
Mukkamala, R [1 ]
Eltoweissy, M [1 ]
机构
[1] Old Dominion Univ, Dept Comp Sci, Norfolk, VA 23529 USA
关键词
threshold cryptography; key management; verifiable secret sharing; trust; wireless security; ad hoc networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure group-based communication services are gaining momentum in wireless ad hoc networks (WAHNs). The efficiency and scalability of these services make-them suitable for supporting the inherently collaborative computing and communications activities among peer WAHN nodes as well as the growing number of group-based WAHN applications. Key management, which is comprised of dynamic key generation, assignment and distribution, is at the heart of secure group communications. This paper proposes TKGS; an efficient threshold-based key generation scheme for open WAHNs based on collaborative reconstruction of key-generation keys. To mitigate node mal-behavior, a verifiable secret sharing technique is employed, where an (authenticated) dealer node is selected to collect, a set number of valid shares and generate new administrative keys. While most existing key management schemes assume reliable, trusted nodes, TKGS provides a distributed solution that is resilient to node failure and mal-behavior. A major advantage of TKGS is its small overhead; collaborative key construction is done in less than two rounds with a very high probability of success.
引用
收藏
页码:31 / 36
页数:6
相关论文
共 50 条
  • [1] A Dynamic Threshold-based Probabilistic Scheme for Broadcasting in Ad hoc Networks
    Chekhar, M.
    Zine-Dine, K.
    Bakhouya, M.
    Aaroud, A.
    [J]. 2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 511 - 516
  • [2] Threshold-based distributed key management scheme for wireless sensor networks
    Jiang, Y.
    Lin, Z. J.
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 419 - 423
  • [3] Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
    Gupta, Ananya
    Mukherjee, Anindo
    Xie, Bin
    Agrawal, Dharma P.
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2007, 67 (09) : 981 - 991
  • [4] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [5] Threshold-based intrusion detection in ad hoc networks and secure AODV
    Patwardhan, A.
    Parker, J.
    Iorga, M.
    Joshi, A.
    Karygiannis, T.
    Yesha, Y.
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 578 - 599
  • [6] Threshold and identity-based key management and authentication for wireless ad hoc networks
    Deng, HM
    Mukherjee, A
    Agrawal, DP
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 107 - 111
  • [7] A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
    Hao, Zhuo
    Zhong, Sheng
    Yu, Nenghai
    [J]. SCIENTIFIC WORLD JOURNAL, 2013,
  • [8] A secure pairwise key establishment scheme in wireless ad hoc networks
    Kim, TaeYeon
    Park, HeeMan
    Lee, HyungHyo
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 1243 - +
  • [9] Secure and robust threshold key management (SRKM) scheme for ad hoc networks
    Hamouid, K.
    Adi, K.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 517 - 534
  • [10] Multigrid based key predistribution scheme in Ad hoc networks
    Cong, Liu
    Huangpu, Jiang
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 749 - +