Abstract
Mobile ad hoc networks (MANETs) are more vulnerable to security attacks compared to the wired networks mainly because they are wireless and dynamic in topology. It becomes very crucial to provide secured and efficient key management scheme as well as all the messages should also be secured. We hereby propose a scheme which provides secure identity-based key management which includes key generation using finger print data as identity of user and Key revocation. The proposed scheme reduces load on network and required computational time at receiver end by sending modified revocation list in accusation messages. Instead of sending entire accusation list, only changes in accusation list are sent. Also, any previous accusation from the current revoked node will be discarded. This results into increased efficiency and enhanced performance of system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Renu Dalal, Yudhvir Singh and Manju Khari, A Review on Key Management Schemes in MANET, International Journal of Distributed and Parallel Systems (IJDPS) Vol. 3, No. 4, July 2012.
Adi Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 47–53. Springer-Verlag New York, Inc., 1985.
Dan Boneh and Matthew K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 213–229. Springer-Verlag, 2001.
J. Clulow and T. Moore. Suicide for the Common Good: a New Strategy for Credential Revocation in Self- organized Systems, ACM SIDOPS Operating Systems Reviews, vol. 40, no. 3, pp. 18–21, 2006.
C. Crepeau and C.R. Davis. A Certificate Revocation Scheme for Wireless Ad Hoc Networks, Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ‘03), ACM Press, ISBN: 1-58113-783-4, pp. 54–61, 2003.
H. Deng, A. Mukherjee, D.P. Agrawal. Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, Inter- national Conference on Information Technology: Coding and computing (ITCC’04), vol. 1, pp. 107–115, 2004.
J.P. Hubaux, L. Buttyan and S. ·Capkun. The Quest for Security in Mobile Ad Hoc Networks, ACM Symposium on Mobile Networking and Computing {MobiHOC 2001, 2001.
A. Khalili, J. Katz, and W. Arbaugh. Toward Secure Key Distribution in Truly Ad-Hoc Networks, 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), IEEE Computer Society, ISBN: 0-7695-1873-7, pp. 342–346, 2003.
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-Securing Ad Hoc Wireless Networks, Seventh IEEE Symposium on Computers and Communications (ISCC ‘02), 2002.
Y. Zhang, W. Liu, W. Lou, and Y. Fang. Securing Mobile Ad Hoc Networks with Certificate less Public Keys. IEEE Trans. Dependable Secure. Computing, vol. 3, no. 4, pp. 386–399, 2006.
L. Zhou and Z.J. Haas. Securing Ad Hoc Networks, IEEE Network Journal, vol. 13, no. 6, pp. 24–30, 1999.
Katrin Hoeper and Guang Gong “Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks”, Ad-Hoc, Mobile, and Wireless Networks, 2007 – Springer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Purvi Ramanuj, Shah, J.S. (2016). Identity-Based Key Management. In: Satapathy, S., Bhatt, Y., Joshi, A., Mishra, D. (eds) Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 438. Springer, Singapore. https://doi.org/10.1007/978-981-10-0767-5_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-0767-5_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0766-8
Online ISBN: 978-981-10-0767-5
eBook Packages: EngineeringEngineering (R0)