Skip to main content

Fully Self-organized Key Management Scheme in MANET and Its Applications

  • Conference paper
  • First Online:
Computer Networks & Communications (NetCom)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 131))

Abstract

The paper first proposes a fully self-organized key management scheme in mobile ad hoc networks which is both certificateless and free from any trusted third party such as Certificate Authority or Key Generation Center. The scheme allows a node to set up the public/private key pair all by itself and use the public key as its identity according to the property of ad hoc networks. Based on the scheme, some applications such as Encryption, Signature, Signcryption algorithms are given. Among these algorithms, the security of encryption algorithms is detailed and the AdvancedEnc is proved to be IND-CCA secure encryption algorithm under the random oracle model. These applications show that our key management scheme is self-organized, simple, efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hegland AM, Winjum E (2006) Survey of key management in ad hoc networks. IEEE Commun Surv Tutor 8(5):48–66

    Article  Google Scholar 

  2. Munivel E, Ajit GM (2010) Efficient public key infrastructure implementation wireless sensor networks. ICWCSC. doi:10.1109

  3. Nisbet A, Rashid MA, Alam F (2010) The quest for optimum server location selection in mobile ad hoc networks utilising threshold cryptography. In: International conference on information technology: new generations, pp 891–896

    Google Scholar 

  4. Yan X, Fuyou M (2003) Secure distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks. Acta Electron Sinica 31(2):161–162

    Google Scholar 

  5. Miao Fuyou, Xiong Yan (2005) PKIM: a public key infrastructure for mobile ad hoc network. Chin J Electron 14(4):594–598

    Google Scholar 

  6. Shamir A (1985) Identity-based cryptosystems and signature schemes. Adv Cryptol 196:47–53

    Article  MathSciNet  Google Scholar 

  7. Li L, Wang Z, Liu W, Wang Y (2011) A certificateless key management scheme in mobile ad hoc networks. In: International conference on, wireless communications, pp 1–4

    Google Scholar 

  8. Li L-C, Liu R-S (2010) Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans Wirel Commun 9(10):3072–3081

    Google Scholar 

  9. Lee H, Kim J, Son J, Kim S, Oh H (2012) ID-based key management scheme using threshold decryption for OPMD environment. IEEE ICCE-2012, pp 733–734

    Google Scholar 

  10. Wang Y, Zou X (2007) An efficient key revocation scheme for wireless sensor networks. IEEE ICC, pp 1260–1265

    Google Scholar 

  11. Li L, Wang Z, Liu W, Wang Y (2011) A certificateless key management scheme in mobile ad hoc networks. Int Conf Wirel Commun, pp 1–4

    Google Scholar 

  12. Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Advances in cryptology-crypto ’99, Lecture notes in computer science, vol 1666. Springer-Verlag, pp 537–554

    Google Scholar 

  13. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. Comput Sci 2139:213–229

    Google Scholar 

  14. Katz J, Lindell Y (2008) Introduction to modern cryptogarphy: principles and protocols. National Defense Industry Press, China

    Google Scholar 

  15. Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. Comput Sci 1462:26–45

    Google Scholar 

Download references

Acknowledgments

The paper is supported by NSF of China (granted No. 60970128, No. 61170233, No. 61272472), Youth Innovation Foundation of USTC of 2010 and China Postdoctoral Science Foundation (No. 2011M501397).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Miao, F., Ruan, W., Du, X., Wang, S. (2013). Fully Self-organized Key Management Scheme in MANET and Its Applications. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_38

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6154-8_38

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6153-1

  • Online ISBN: 978-1-4614-6154-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics