Abstract
The collaboration of at least a threshold number of secret shareholders in a threshold secret sharing scheme is a strict requirement to ensure its intended functionality. Due to its promising characteristics, such a scheme has been proposed to solve a range of security problems in mobile ad hoc networks. However, discovering a sufficient number of secret shareholders in such dynamic and unpredictable networks is not easy. In this paper, we propose a more efficient shareholder discovery mechanism compared to our previous work. The discovery process is performed in a multihop fashion to adapt to the mobile ad hoc network environment. We introduce batch extension that gradually extends the shareholders' collaboration boundary by more than one hop at a time around the service requestor, to find at least the threshold number of the unknown shareholders. Through the batch extension, reply aggregation is applicable, hence reducing the redundancy use of reply routes, decreasing the required packet transmission, and lessening the service delay, compared to the previously proposed mechanism. Our simulation results show that, with the appropriate batch size, the latest mechanism is more efficient with an insignificant increase of control overhead.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Syamir A. How to share secret. Communications of ACM, Nov. 1979, 22(11): 612–613.
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. ICNP, Riverside, USA, Nov. 11–14, 2001, pp.251-260.
Yang H, Shu J, Meng X, Lu S. SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, Feb. 2006, 24(2): 261–273.
Luo H, Kong J, Zerfos P, Lu S, Zhang L. URSA: Ubiquitous and robust access control for mobile ad hoc network. IEEE/ACM Transactions on Networking, Dec. 2004, 12(6): 1049–1063.
Chen W, Lee H. Modelling threshold secret sharing schemes in ad hoc networks. In Proc. International Conference on Networking, Architecture, and Storage, Chongqing, China, Jun. 12–14, 2008, pp.207-214.
Wang G, Wang Q, Cao J, Guo M. An effective trust establishment scheme for authentication in mobile ad-hoc networks. In Proc. the 7th IEEE International Conference on Computer and Information Technology, Aizu, Japan, Oct. 16–19, 2007, pp.749-754.
Yi S, Kravets R. Key management for heterogeneous ad hoc wireless networks. In Proc. the 10th IEEE International Conference on Network Protocols (ICNP 2002), Paris, France, Nov. 12–15, 2002, pp.202-205.
Yi S, Kravets R. Moca: Mobile certificate authority for wireless ad hoc networks. In Proc. the 2nd Annual PKI Research Workshop (PKI 2003), Gaithersburg, USA, Apr. 28–29, 2003.
Sen J, Subramanyam H. An efficient certificate authority for ad hoc networks. In Proc. the 4th Int. Conf. Distributed Computing and Internet Technology, Bhubaneswar, India, Dec. 22–24, 2005, pp.97-109.
Wu B, Wu J, Fernandez E B, Ilyas M, Magliveras S. Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications, 2007, 30(3): 937–954.
Tarmizi S, Veeraraghavan P, Ghosh S. Extending the collaboration boundary in localized threshold cryptography-based schemes for MANETs. In Proc. 2009 IEEE 9th Malaysian International Conference on Communications, Kuala Lumpur, Malaysia, Dec. 15–17, 2009, pp.15-17.
Djenouri D, Khelladi L, Badache N. A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials, 2005, 7(4): 2–28.
Zhou L, Haas Z J. Securing ad hoc networks. IEEE Network, Nov./Dec. 1999, 13(6): 24–30.
Bettstetter C. On the minimum node degree and connectivity of a wireless multihop network. In Proc. MOBIHOC2002, Lausanne, Switzerland, Jun. 9–11, 2002, pp.80-91.
Jeng A A, Jan R. The r-neighbourhood graph: An adjustable structure for topology control in wireless ad hoc networks. IEEE Transaction on Parallel and Distributed Systems, Apr. 2007, 18(4): 536–549.
Deng J, Han Y S, Chen P, Varshney P K. Optimal transmission range for wireless ad hoc networks based on energy efficiency. IEEE Transactions on Communications, Sept. 2007, 55(9): 1772–1782.
Park I, Kim J, Pu I. Blocking expanding ring search algorithm for efficient energy consumption in mobile ad hoc networks. http://hal.archives-ouvertes.fr/docs/00/05/46/87/PDF/22-Park.pdf.
Al-Rodhaan M A, Mackenzie L, Ould-Khaoua M. Improvement to blocking expanding ring search for MANETs. http://www.dcs.gla.ac.uk/publications/PAPERS/8939/B-ERS+.pdf.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tarmizi, S., Veeraraghavan, P. & Ghosh, S. Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs. J. Comput. Sci. Technol. 26, 711–721 (2011). https://doi.org/10.1007/s11390-011-1170-3
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-011-1170-3