Skip to main content

Identity-Based Key Management

  • Conference paper
  • First Online:
  • 1033 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 438))

Abstract

Mobile ad hoc networks (MANETs) are more vulnerable to security attacks compared to the wired networks mainly because they are wireless and dynamic in topology. It becomes very crucial to provide secured and efficient key management scheme as well as all the messages should also be secured. We hereby propose a scheme which provides secure identity-based key management which includes key generation using finger print data as identity of user and Key revocation. The proposed scheme reduces load on network and required computational time at receiver end by sending modified revocation list in accusation messages. Instead of sending entire accusation list, only changes in accusation list are sent. Also, any previous accusation from the current revoked node will be discarded. This results into increased efficiency and enhanced performance of system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Renu Dalal, Yudhvir Singh and Manju Khari, A Review on Key Management Schemes in MANET, International Journal of Distributed and Parallel Systems (IJDPS) Vol. 3, No. 4, July 2012.

    Google Scholar 

  2. Adi Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 47–53. Springer-Verlag New York, Inc., 1985.

    Google Scholar 

  3. Dan Boneh and Matthew K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 213–229. Springer-Verlag, 2001.

    Google Scholar 

  4. J. Clulow and T. Moore. Suicide for the Common Good: a New Strategy for Credential Revocation in Self- organized Systems, ACM SIDOPS Operating Systems Reviews, vol. 40, no. 3, pp. 18–21, 2006.

    Google Scholar 

  5. C. Crepeau and C.R. Davis. A Certificate Revocation Scheme for Wireless Ad Hoc Networks, Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ‘03), ACM Press, ISBN: 1-58113-783-4, pp. 54–61, 2003.

    Google Scholar 

  6. H. Deng, A. Mukherjee, D.P. Agrawal. Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, Inter- national Conference on Information Technology: Coding and computing (ITCC’04), vol. 1, pp. 107–115, 2004.

    Google Scholar 

  7. J.P. Hubaux, L. Buttyan and S. ·Capkun. The Quest for Security in Mobile Ad Hoc Networks, ACM Symposium on Mobile Networking and Computing {MobiHOC 2001, 2001.

    Google Scholar 

  8. A. Khalili, J. Katz, and W. Arbaugh. Toward Secure Key Distribution in Truly Ad-Hoc Networks, 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), IEEE Computer Society, ISBN: 0-7695-1873-7, pp. 342–346, 2003.

    Google Scholar 

  9. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-Securing Ad Hoc Wireless Networks, Seventh IEEE Symposium on Computers and Communications (ISCC ‘02), 2002.

    Google Scholar 

  10. Y. Zhang, W. Liu, W. Lou, and Y. Fang. Securing Mobile Ad Hoc Networks with Certificate less Public Keys. IEEE Trans. Dependable Secure. Computing, vol. 3, no. 4, pp. 386–399, 2006.

    Google Scholar 

  11. L. Zhou and Z.J. Haas. Securing Ad Hoc Networks, IEEE Network Journal, vol. 13, no. 6, pp. 24–30, 1999.

    Google Scholar 

  12. Katrin Hoeper and Guang Gong “Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks”, Ad-Hoc, Mobile, and Wireless Networks, 2007 – Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Purvi Ramanuj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Purvi Ramanuj, Shah, J.S. (2016). Identity-Based Key Management. In: Satapathy, S., Bhatt, Y., Joshi, A., Mishra, D. (eds) Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 438. Springer, Singapore. https://doi.org/10.1007/978-981-10-0767-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0767-5_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0766-8

  • Online ISBN: 978-981-10-0767-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics