Abstract
A hierarchical key sharing model in ad-hoc is presented and a key management protocol based on this model is designed. Nodes were divided into two parts in the network, server nodes and ordinary nodes. The shares hold by server nodes include more information than ordinary ones. Key reconstruction is implemented by collaboration of k nodes(including at least k 1 server nodes). Key share distribution, key reconstruction, key share refreshing and recovery are discussed in this paper. The presented protocols improve the availability and enhance the security compared with the existing partially and fully distributed schemes respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Menezes, A., van Oorschot, P., Vantone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Forine, K.: Key Management in Ad Hoc Networks, http://www.ep.liu.se/exjobb/isy/2002/3322/
Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organized Public-Key Management for Mobile Ad hoc Networks. IEEE Transactions on mpbile Computing 2(1), 1–13 (2003)
Garfinkel, S.: PGP: Pretty Good Privacy. OReilly & Associates (1995), ISBN 1-56592-098-8 2003
Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure Pebblenets. In: Proceedings of the 2nd ACM international symposium on Mobile ad- hoc networking and computing table of contents ACM 2001, Long Beach, CA, USA, pp. 156–163 (2001)
Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authenti- cation in Ad-Hoc Wireless Networks. In: Proceedings of Network and Distributed System Security Symposium 2002, San Diego, CA (February 2002)
Stanjo, F., Anderson, R.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks, http://www.cl.cam.ac.uk/~fms27/duckling/duckling.html
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks 13(6) (1999)
Luo, H., Lu, S.: Ubiquitous and Robust Authentication Service for Ad Hoc Wireless Networks, it Technical Report 20030, UCLA Computer Science Science Department (2000)
Tassa, T.: Hierarchical Threshold Secret Sharing. In: EUROCRYPT 1990. LNCS, vol. 2591, pp. 473–493. springer, Heidelberg (2004)
Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th IEEE symposium on Foundations of Computer Science, pp. 427–437 (1987)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: how to cope with perpetual leakage. In: Advances in Cryptology crypto 1995. Lecture Notes in Computer Science, vol. 953, pp. 339–352. Springer, Heidelberg (1995)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Seventh International Symposium on IEEE ISCC 2002, pp. 567–574 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ma, C., Cheng, R. (2008). Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-79499-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79498-1
Online ISBN: 978-3-540-79499-8
eBook Packages: Computer ScienceComputer Science (R0)