Abstract
Robust key management is one of the most crucial technologies for security of ad hoc networks. In this paper, a new scheme for key management is proposed using identity-based (ID-based) signcryption and threshold cryptography. It enables flexible and efficient key management while respecting the constraints of ad hoc networks. In our new scheme, public key certificates are not needed and every client uses its identity as its public key. It greatly decreases the need of computing and storage abilities of clients’ terminals, as well as communication cost for system key management.
This work was supported by NSF of China with contract No.19971096 and No. 90104035.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Perkins, C.: Ad Hoc Networking. Addison-Wesley Newyork, Reading (2001)
Zhou, L., Haas, Z.J.: Securing Ad hoc Networks. IEEE Networks 13(6), 24–30 (1999)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: 7th IEEE Symp. on Computers and Communications, pp. 567–574 (2002)
Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organized Public-Key Management for Mobile Ad hoc Networks. IEEE Trans. on Mobile Computing 2(1), 52–64 (2003)
Khalili, A., Katz, J., Arbaugh, W.A.: Towards Secure Key Distribution in Truly Ad Hoc Networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks (2003)
Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. Available: seungyi, http://mobius.cs.uiuc.edu/
Boyen, X.: Multipurpose identity-based signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)
Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM/Kluwer Wireless Networks Journal 9(5), 545–556 (2003)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Royer, E.M., Perkins, C.: Multicast Operation of the Ad Hoc On-Demand Distance Vector Routing Protocol. In: ACM MOBICOM, pp. 207–218 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, G., Han, W. (2005). A New Scheme for Key Management in Ad Hoc Networks. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)