Abstract
The paper first proposes a fully self-organized key management scheme in mobile ad hoc networks which is both certificateless and free from any trusted third party such as Certificate Authority or Key Generation Center. The scheme allows a node to set up the public/private key pair all by itself and use the public key as its identity according to the property of ad hoc networks. Based on the scheme, some applications such as Encryption, Signature, Signcryption algorithms are given. Among these algorithms, the security of encryption algorithms is detailed and the AdvancedEnc is proved to be IND-CCA secure encryption algorithm under the random oracle model. These applications show that our key management scheme is self-organized, simple, efficient and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hegland AM, Winjum E (2006) Survey of key management in ad hoc networks. IEEE Commun Surv Tutor 8(5):48–66
Munivel E, Ajit GM (2010) Efficient public key infrastructure implementation wireless sensor networks. ICWCSC. doi:10.1109
Nisbet A, Rashid MA, Alam F (2010) The quest for optimum server location selection in mobile ad hoc networks utilising threshold cryptography. In: International conference on information technology: new generations, pp 891–896
Yan X, Fuyou M (2003) Secure distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks. Acta Electron Sinica 31(2):161–162
Miao Fuyou, Xiong Yan (2005) PKIM: a public key infrastructure for mobile ad hoc network. Chin J Electron 14(4):594–598
Shamir A (1985) Identity-based cryptosystems and signature schemes. Adv Cryptol 196:47–53
Li L, Wang Z, Liu W, Wang Y (2011) A certificateless key management scheme in mobile ad hoc networks. In: International conference on, wireless communications, pp 1–4
Li L-C, Liu R-S (2010) Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans Wirel Commun 9(10):3072–3081
Lee H, Kim J, Son J, Kim S, Oh H (2012) ID-based key management scheme using threshold decryption for OPMD environment. IEEE ICCE-2012, pp 733–734
Wang Y, Zou X (2007) An efficient key revocation scheme for wireless sensor networks. IEEE ICC, pp 1260–1265
Li L, Wang Z, Liu W, Wang Y (2011) A certificateless key management scheme in mobile ad hoc networks. Int Conf Wirel Commun, pp 1–4
Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Advances in cryptology-crypto ’99, Lecture notes in computer science, vol 1666. Springer-Verlag, pp 537–554
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. Comput Sci 2139:213–229
Katz J, Lindell Y (2008) Introduction to modern cryptogarphy: principles and protocols. National Defense Industry Press, China
Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. Comput Sci 1462:26–45
Acknowledgments
The paper is supported by NSF of China (granted No. 60970128, No. 61170233, No. 61272472), Youth Innovation Foundation of USTC of 2010 and China Postdoctoral Science Foundation (No. 2011M501397).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Miao, F., Ruan, W., Du, X., Wang, S. (2013). Fully Self-organized Key Management Scheme in MANET and Its Applications. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_38
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6154-8_38
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6153-1
Online ISBN: 978-1-4614-6154-8
eBook Packages: EngineeringEngineering (R0)