Skip to main content
Log in

MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A mobile ad hoc network (MANET) is a collection of self-configured movable nodes. Keys have to be securely handled and maintained and there are various techniques available in MANET for efficient key generation and distribution. Trying to keep the keys always protected during transmission is a difficult issue. A multipart trust based public key management (MTPKM) is intended to gather a requisite stage of security, in addition to convene better output necessities like service accessibility and message overhead exclusive of communication on known certificate authority. An optimal trust threshold is associated with all the nodes to reduce security vulnerabilities like the public key compromise and key leakage. MTPKM does not support trusted the third party hence it finds the most trusted neighbor node which satisfies the trust threshold condition to certifying the key generated. In turn, the neighbor node again ensures the confidence of the node which is requesting to certify the public key. The requesting node and certificate issuer node must exhibit a mutual trust relationship. The proposed trust-based scheme is simulated and the performance is evaluated. It is observed that the proposed scheme surpasses other trust-based models in terms of availability and security vulnerability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Harold Robinson, Y., & Rajaram, M. (2016). A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3213-0.

    Article  Google Scholar 

  2. Balaji, S., & Rajaram, M. (2016). SIPTAN: Securing inimitable and plundering track for ad hoc network. Wireless Personal Communications, 9, 1–21. https://doi.org/10.1007/s11277-016-3187-y.

    Article  Google Scholar 

  3. Cho, J.-H., et al. (2016). Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2016.02.014.

    Article  Google Scholar 

  4. Luo, H., & Lu, S. (2004). URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12, 1049–1063.

    Article  Google Scholar 

  5. Capkun, S., Buttyan, L., & Pierre, J. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transaction on Mobile Computing, 2, 1233–1536.

    Article  Google Scholar 

  6. Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. In MobiHoc (pp. 299–302).

  7. Kapil, A., & Rana, S. (2008). Identity-based key management in MANETs using public key cryptography. International Journal of Security, 3, 1–6.

    Google Scholar 

  8. Xoing, W., & Gong, Y. H. (2011). Secure and highly efficient three level key management scheme for MANET. WSEAS Transactions on Computers, 10(10), 6–15.

    Google Scholar 

  9. Van der Merwe, J., Dawoud, D., & McDonald, S. (2004). Trustworthy key management for mobile ad hoc networks. In Proceedings southern African telecommunication networks and applications conference (SATNAC).

  10. Sahadevaiah, K., & Ramanaiah, O. B. V. (2008). Self-organized public-key cryptography for mobile ad hoc networks. IEICE Transactions on Communications, E91–B(11), 3574–3583.

    Google Scholar 

  11. Tamboli, A. S., Shinde, S. S., & Tamboli, S. S. (2011). Simulation of self-organized public-key management for ad hoc networks. IJCA Special Issue on Network Security and Cryptography (NSC).

  12. Maity, S., & Hansdah, R. C. (2014). Self-organized public key management in MANETs with enhanced security and without certificate-chains. Computer Networks, 65, 183–211.

    Article  Google Scholar 

  13. Lehane, B., & Doyle, L. (2006). Shared RSA key generation in a mobile ad hoc network. IEEE Transactions on Mobile Computing, 5, 43–51.

    Article  Google Scholar 

  14. John, S. P., & Samuel, P. (2015). Self-organized key management with trusted certificate exchange in MANET. Ain Shams Engineering Journal, 6(1), 161–170.

    Article  Google Scholar 

  15. Chauhan, K. K., & Tapaswe, S. (2010). A secure key management system in group structured mobile ad hoc networks. In IEEE international conference on wireless communications, networking and information security (pp. 307–311).

  16. Huang, H., & Wu, S.F. (2003). An approach to certificate path discovery in mobile ad hoc networks. In 1st ACM workshop on security of ad hoc and sensor networks.

  17. Huang, J., & Nicol, D. (2009). A calculus of trust and its application to PKI and identity management. In ACM 8th symposium on identity and trust on the internet.

  18. Meng, X., & Li, Y. (2012). Verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network. In IEEE international conference on automation and logistics (Vol. 2, pp. 673–689).

  19. Shamir, A. (2007). Threshold cryptography based on sharing of secrets. In ACM symposium on identity and trust on the internet (pp. 612–613).

  20. Zhang, Y., Liu, W., Fang, Y., & Kwon, Y. (2005). AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks. In: IEEE international conference on communications (ICC’05) (Vol. 25, pp. 3515–3519).

  21. Al-Riyami, S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (Vol. 2894, pp. 452–473).

  22. Harold Robinson, Y., Balaji, S., & Golden Julie, E. (2018). Design of a buffer enabled ad hoc on-demand multipath distance vector routing protocol for improving throughput in mobile ad hoc networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-018-5925-9.

    Article  Google Scholar 

  23. Rana, S., & Kapil, A. (2001). Identity-based and threshold key management in mobile ad hoc networks. In Proceeding of ACM symposium on MANET (pp. 146–155).

  24. Sun, H., Zheng, X., & Deng, Z. (2009). An identity-based and threshold key management scheme for ad hoc networks. In International conference on networks security and wireless communications and trusted computing (pp. 520–523).

  25. Dahshan, H., Elsayed, F., Rohiem, A., Elmoghazy, A., & Irvin, J. (2008). A trust based threshold revocation scheme for MANET. IEEE MASS, 2008, 130–137.

    Google Scholar 

  26. Cho, J. H., Swami, A., & Chen, I. R. (2010). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.

    Article  Google Scholar 

  27. Harold Robinson, Y. & Golden Julie, E. (2019). SMR: A synchronized multipath rebroadcasting mechanism for improving the quality of conversational video service. Wireless Personal Communications, 104(3), 1149–1173.

    Article  Google Scholar 

  28. Dahshan, H., & Irvine, J. (2009). Key management in web of trust for mobile ad hoc networks. In International conference on advanced information networking and applications (Vol. 13, pp. 24–30).

  29. Chang, M. J., Cho, J.‐H., Chen, I.‐R., Chan, K. S., & Swami, A. (2012). Trust‐based task assignment in military tactical networks. In 17th international command & control research & technology symposium (ICCRTS).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Harold Robinson.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Harold Robinson, Y., Golden Julie, E. MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks. Wireless Pers Commun 109, 739–760 (2019). https://doi.org/10.1007/s11277-019-06588-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06588-4

Keywords

Navigation