Skip to main content
Log in

Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs

  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The collaboration of at least a threshold number of secret shareholders in a threshold secret sharing scheme is a strict requirement to ensure its intended functionality. Due to its promising characteristics, such a scheme has been proposed to solve a range of security problems in mobile ad hoc networks. However, discovering a sufficient number of secret shareholders in such dynamic and unpredictable networks is not easy. In this paper, we propose a more efficient shareholder discovery mechanism compared to our previous work. The discovery process is performed in a multihop fashion to adapt to the mobile ad hoc network environment. We introduce batch extension that gradually extends the shareholders' collaboration boundary by more than one hop at a time around the service requestor, to find at least the threshold number of the unknown shareholders. Through the batch extension, reply aggregation is applicable, hence reducing the redundancy use of reply routes, decreasing the required packet transmission, and lessening the service delay, compared to the previously proposed mechanism. Our simulation results show that, with the appropriate batch size, the latest mechanism is more efficient with an insignificant increase of control overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Syamir A. How to share secret. Communications of ACM, Nov. 1979, 22(11): 612–613.

    Article  Google Scholar 

  2. Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. ICNP, Riverside, USA, Nov. 11–14, 2001, pp.251-260.

  3. Yang H, Shu J, Meng X, Lu S. SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, Feb. 2006, 24(2): 261–273.

    Article  Google Scholar 

  4. Luo H, Kong J, Zerfos P, Lu S, Zhang L. URSA: Ubiquitous and robust access control for mobile ad hoc network. IEEE/ACM Transactions on Networking, Dec. 2004, 12(6): 1049–1063.

    Article  Google Scholar 

  5. Chen W, Lee H. Modelling threshold secret sharing schemes in ad hoc networks. In Proc. International Conference on Networking, Architecture, and Storage, Chongqing, China, Jun. 12–14, 2008, pp.207-214.

  6. Wang G, Wang Q, Cao J, Guo M. An effective trust establishment scheme for authentication in mobile ad-hoc networks. In Proc. the 7th IEEE International Conference on Computer and Information Technology, Aizu, Japan, Oct. 16–19, 2007, pp.749-754.

  7. Yi S, Kravets R. Key management for heterogeneous ad hoc wireless networks. In Proc. the 10th IEEE International Conference on Network Protocols (ICNP 2002), Paris, France, Nov. 12–15, 2002, pp.202-205.

  8. Yi S, Kravets R. Moca: Mobile certificate authority for wireless ad hoc networks. In Proc. the 2nd Annual PKI Research Workshop (PKI 2003), Gaithersburg, USA, Apr. 28–29, 2003.

  9. Sen J, Subramanyam H. An efficient certificate authority for ad hoc networks. In Proc. the 4th Int. Conf. Distributed Computing and Internet Technology, Bhubaneswar, India, Dec. 22–24, 2005, pp.97-109.

  10. Wu B, Wu J, Fernandez E B, Ilyas M, Magliveras S. Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications, 2007, 30(3): 937–954.

    Article  Google Scholar 

  11. Tarmizi S, Veeraraghavan P, Ghosh S. Extending the collaboration boundary in localized threshold cryptography-based schemes for MANETs. In Proc. 2009 IEEE 9th Malaysian International Conference on Communications, Kuala Lumpur, Malaysia, Dec. 15–17, 2009, pp.15-17.

  12. Djenouri D, Khelladi L, Badache N. A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials, 2005, 7(4): 2–28.

    Article  Google Scholar 

  13. Zhou L, Haas Z J. Securing ad hoc networks. IEEE Network, Nov./Dec. 1999, 13(6): 24–30.

    Article  Google Scholar 

  14. Bettstetter C. On the minimum node degree and connectivity of a wireless multihop network. In Proc. MOBIHOC2002, Lausanne, Switzerland, Jun. 9–11, 2002, pp.80-91.

  15. Jeng A A, Jan R. The r-neighbourhood graph: An adjustable structure for topology control in wireless ad hoc networks. IEEE Transaction on Parallel and Distributed Systems, Apr. 2007, 18(4): 536–549.

    Article  Google Scholar 

  16. Deng J, Han Y S, Chen P, Varshney P K. Optimal transmission range for wireless ad hoc networks based on energy efficiency. IEEE Transactions on Communications, Sept. 2007, 55(9): 1772–1782.

    Article  Google Scholar 

  17. Park I, Kim J, Pu I. Blocking expanding ring search algorithm for efficient energy consumption in mobile ad hoc networks. http://hal.archives-ouvertes.fr/docs/00/05/46/87/PDF/22-Park.pdf.

  18. Al-Rodhaan M A, Mackenzie L, Ould-Khaoua M. Improvement to blocking expanding ring search for MANETs. http://www.dcs.gla.ac.uk/publications/PAPERS/8939/B-ERS+.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seleviawati Tarmizi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tarmizi, S., Veeraraghavan, P. & Ghosh, S. Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs. J. Comput. Sci. Technol. 26, 711–721 (2011). https://doi.org/10.1007/s11390-011-1170-3

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-011-1170-3

Keywords

Navigation