Skip to main content
Log in

Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a compromise-tolerant (t,n)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification management is achieved anonymously by an Anonymous Certification Authority (ACA). The latter is fully distributed into multiple disjointed coalitions of nodes whose structure is made hidden. This prevents an adversary from taking the control of the ACA by arbitrarily compromising t or more nodes. In other words, our proposal enhances the compromise-tolerance to more than the threshold number t of nodes without breaking down the whole certification system. As a result, our scheme requires a very smaller threshold than traditional schemes, which improves considerably the service availability. The experimental study shows a clear advantage over traditional threshold-based certification schemes by ensuring a significant positive compromise between security and availability of certification service.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. The hypergeometric distribution is a discrete probability distribution that describes the probability of k successes in n draws, without replacement, from a finite population of size N that contains exactly K successes

References

  1. Beimel A (2011) Secret-sharing schemes: a survey. In: Coding and cryptology - third international workshop, IWCC 2011, Qingdao, China, May 30–June 3, 2011. Proceedings, pp 11–46

  2. Camenisch J, Shoup V (2003) Practical verifiable encryption and decryption of discrete logarithms. In: Advances in cryptology - CRYPTO 2003, 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003, Proceedings, pp 126–144

  3. Chen Z, Li S, Wu Q, Huang Q (2015) A distributed secret share update scheme with public verifiability for ad hoc network. Security and Communication Networks 8(8):1485–1493

    Article  Google Scholar 

  4. Guo Y, Ma J, Chao W, Yang K (2013) Incentive-based optimal nodes selection mechanism for threshold key management in manets with selfish nodes. Int J Distrib Sens Netw, 2013

  5. Hamouid K, Adi K (2010) Secure and robust threshold key management (SRKM) scheme for ad hoc networks. Security and Communication Networks 3(6):517–534

    Article  Google Scholar 

  6. Hamouid K, Adi K (2015) Efficient certificateless web-of-trust model for public-key authentication in MANET. Comput Commun 63:24–39

    Article  Google Scholar 

  7. Kobayashi K, Totani Y, Utsu K, Ishii H (2016) Achieving secure communication over MANET using secret sharing schemes. J Supercomput 72(3):1215–1225

    Article  Google Scholar 

  8. Li L, Liu R (2010) Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans Wirel Commun 9(10):3072–3081

    Article  Google Scholar 

  9. Maity S, Hansdah R (2014) Self-organized public key management in manets with enhanced security and without certificate-chains. Comput Netw 65(0):183–211

    Article  Google Scholar 

  10. Meng X, Li Y (2012) A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network. In: 2012 IEEE international conference on automation and logistics, Zhengzhou, China, August 15-17, 2012, pp 315–320

  11. Omar M, Boufaghes H, Mammeri L, Taalba A, Tari A (2016) Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J Netw Comput Appl 62:153–162

    Article  Google Scholar 

  12. Park Y, Park Y, Moon S (2013) Anonymous cluster-based manets with threshold signature. Int J Distrib Sens Netw 2013

  13. Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In: Advances in cryptology - CRYPTO ’91, 11th annual international cryptology conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp 129–140

  14. Pedersen TP (1991) A threshold cryptosystem without a trusted party (extended abstract). In: Advances in cryptology - EUROCRYPT ’91, workshop on the theory and application of of cryptographic techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp 522–526

  15. Schnorr CP (1990) Efficient identification and signatures for smart cards. Springer, Berlin, pp 239–252

    MATH  Google Scholar 

  16. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  17. Yao L, Deng J, Wang J, Wu G (2015) A-CACHE: an anchor-based public key caching scheme in large wireless networks. Comput Netw 87:78–88

    Article  Google Scholar 

  18. Zhou L, Haas Z (1999) Securing ad hoc networks. Network, IEEE 13(6):24–30

    Article  Google Scholar 

  19. Zhou L, Schneider FB, van Renesse R (2005) APSS: Proactive secret sharing in asynchronous systems. ACM Trans Inf Syst Secur 8(3):259–286

    Article  Google Scholar 

  20. Zhu B, Bao F, Deng RH, Kankanhalli MS, Wang G (2005) Efficient and robust key management for large mobile ad hoc networks. Comput Netw 48(4):657–682

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled Hamouid.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamouid, K., Adi, K. Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Netw. Appl. 12, 1137–1155 (2019). https://doi.org/10.1007/s12083-019-00787-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00787-3

Keywords

Navigation