Fully Self-organized Key Management Scheme in MANET and Its Applications

  • Fuyou Miao
  • Wenjing Ruan
  • Xianchang Du
  • Suwan Wang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)

Abstract

The paper first proposes a fully self-organized key management scheme in mobile ad hoc networks which is both certificateless and free from any trusted third party such as Certificate Authority or Key Generation Center. The scheme allows a node to set up the public/private key pair all by itself and use the public key as its identity according to the property of ad hoc networks. Based on the scheme, some applications such as Encryption, Signature, Signcryption algorithms are given. Among these algorithms, the security of encryption algorithms is detailed and the AdvancedEnc is proved to be IND-CCA secure encryption algorithm under the random oracle model. These applications show that our key management scheme is self-organized, simple, efficient and practical.

Keywords

Mobile network Ad hoc Key management Fully self-organized Random oracle model 

Notes

Acknowledgments

The paper is supported by NSF of China (granted No. 60970128, No. 61170233, No. 61272472), Youth Innovation Foundation of USTC of 2010 and China Postdoctoral Science Foundation (No. 2011M501397).

References

  1. 1.
    Hegland AM, Winjum E (2006) Survey of key management in ad hoc networks. IEEE Commun Surv Tutor 8(5):48–66CrossRefGoogle Scholar
  2. 2.
    Munivel E, Ajit GM (2010) Efficient public key infrastructure implementation wireless sensor networks. ICWCSC. doi: 10.1109
  3. 3.
    Nisbet A, Rashid MA, Alam F (2010) The quest for optimum server location selection in mobile ad hoc networks utilising threshold cryptography. In: International conference on information technology: new generations, pp 891–896Google Scholar
  4. 4.
    Yan X, Fuyou M (2003) Secure distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks. Acta Electron Sinica 31(2):161–162Google Scholar
  5. 5.
    Miao Fuyou, Xiong Yan (2005) PKIM: a public key infrastructure for mobile ad hoc network. Chin J Electron 14(4):594–598Google Scholar
  6. 6.
    Shamir A (1985) Identity-based cryptosystems and signature schemes. Adv Cryptol 196:47–53MathSciNetCrossRefGoogle Scholar
  7. 7.
    Li L, Wang Z, Liu W, Wang Y (2011) A certificateless key management scheme in mobile ad hoc networks. In: International conference on, wireless communications, pp 1–4Google Scholar
  8. 8.
    Li L-C, Liu R-S (2010) Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans Wirel Commun 9(10):3072–3081Google Scholar
  9. 9.
    Lee H, Kim J, Son J, Kim S, Oh H (2012) ID-based key management scheme using threshold decryption for OPMD environment. IEEE ICCE-2012, pp 733–734Google Scholar
  10. 10.
    Wang Y, Zou X (2007) An efficient key revocation scheme for wireless sensor networks. IEEE ICC, pp 1260–1265Google Scholar
  11. 11.
    Li L, Wang Z, Liu W, Wang Y (2011) A certificateless key management scheme in mobile ad hoc networks. Int Conf Wirel Commun, pp 1–4Google Scholar
  12. 12.
    Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Advances in cryptology-crypto ’99, Lecture notes in computer science, vol 1666. Springer-Verlag, pp 537–554Google Scholar
  13. 13.
    Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. Comput Sci 2139:213–229Google Scholar
  14. 14.
    Katz J, Lindell Y (2008) Introduction to modern cryptogarphy: principles and protocols. National Defense Industry Press, ChinaGoogle Scholar
  15. 15.
    Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. Comput Sci 1462:26–45Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Fuyou Miao
    • 1
  • Wenjing Ruan
    • 1
  • Xianchang Du
    • 1
  • Suwan Wang
    • 2
  1. 1.School of Computer Science and TechnologyUniversity of Science and Technology of ChinaHe FeiChina
  2. 2.School of Computer Science and TechnologyUniversity of AnhuiHe FeiChina

Personalised recommendations