Skip to main content

Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks

  • Conference paper
Book cover Information Security and Cryptology (Inscrypt 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4990))

Included in the following conference series:

Abstract

A hierarchical key sharing model in ad-hoc is presented and a key management protocol based on this model is designed. Nodes were divided into two parts in the network, server nodes and ordinary nodes. The shares hold by server nodes include more information than ordinary ones. Key reconstruction is implemented by collaboration of k nodes(including at least k 1 server nodes). Key share distribution, key reconstruction, key share refreshing and recovery are discussed in this paper. The presented protocols improve the availability and enhance the security compared with the existing partially and fully distributed schemes respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Menezes, A., van Oorschot, P., Vantone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  2. Forine, K.: Key Management in Ad Hoc Networks, http://www.ep.liu.se/exjobb/isy/2002/3322/

  3. Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organized Public-Key Management for Mobile Ad hoc Networks. IEEE Transactions on mpbile Computing 2(1), 1–13 (2003)

    Google Scholar 

  4. Garfinkel, S.: PGP: Pretty Good Privacy. OReilly & Associates (1995), ISBN 1-56592-098-8 2003

    Google Scholar 

  5. Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure Pebblenets. In: Proceedings of the 2nd ACM international symposium on Mobile ad- hoc networking and computing table of contents ACM 2001, Long Beach, CA, USA, pp. 156–163 (2001)

    Google Scholar 

  6. Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authenti- cation in Ad-Hoc Wireless Networks. In: Proceedings of Network and Distributed System Security Symposium 2002, San Diego, CA (February 2002)

    Google Scholar 

  7. Stanjo, F., Anderson, R.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks, http://www.cl.cam.ac.uk/~fms27/duckling/duckling.html

  8. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks 13(6) (1999)

    Google Scholar 

  9. Luo, H., Lu, S.: Ubiquitous and Robust Authentication Service for Ad Hoc Wireless Networks, it Technical Report 20030, UCLA Computer Science Science Department (2000)

    Google Scholar 

  10. Tassa, T.: Hierarchical Threshold Secret Sharing. In: EUROCRYPT 1990. LNCS, vol. 2591, pp. 473–493. springer, Heidelberg (2004)

    Google Scholar 

  11. Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th IEEE symposium on Foundations of Computer Science, pp. 427–437 (1987)

    Google Scholar 

  12. Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: how to cope with perpetual leakage. In: Advances in Cryptology crypto 1995. Lecture Notes in Computer Science, vol. 953, pp. 339–352. Springer, Heidelberg (1995)

    Google Scholar 

  13. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Seventh International Symposium on IEEE ISCC 2002, pp. 567–574 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dingyi Pei Moti Yung Dongdai Lin Chuankun Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, C., Cheng, R. (2008). Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79499-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79498-1

  • Online ISBN: 978-3-540-79499-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics