Abstract
Providing secure communications is a crucial task for the success of future ubiquitous mobile communication systems. Using public key infrastructure (PKI) is considered as a good solution to fulfill the task. However, as mobile ad hoc networks (MANET) inherit unique characteristics such as dynamic topology, non-infrastructure architecture, centralized PKI architectures are not suitable for dynamic MANET. The use of distributed PKI models is more appropriate but requires additional modifications to adapt with network changes. In this paper, we introduce a novel key management scheme for MANET, which exploits advantages of threshold cryptography. The major innovative aspect of this scheme is the use of temporal substitute certificate authorities (SCA), which form a PKI model of multi SCA groups. Performance results obtained by computer simulation show that the proposed key management scheme can reduce the latency of authentication, certificate update delay and the signaling load.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine 2(3), 28–39 (2004)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: The Proc. of 8th Annual International Conference Mobile Computing and Networking (Mobicom 2002), pp. 12–23. ACM Press, New York (2002)
Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: The Proc. of ACM Workshop on wireless security (WiSe), pp. 1–10. ACM Press, New York (2002)
Sanzgiri, K., et al.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, November 12-15, pp. 78–87 (2002)
Bechler, M., Hof, H.-J., Kraft, D., Pahlke, F., Wolf, L.: A cluster-based security architecture for ad hoc networks. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, March 7-11, vol. 4, pp. 2393–2403 (2004)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)
Yi, S., Kravets, R.: Composite Key Management for Ad hoc networks. In: The First International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2004, August 22-26, pp. 52–61 (2004)
Desmedt, Y.: Some recent research aspects of threshold cryptography. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 158–173. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nguyen, H.N., Morino, H. (2005). A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_93
Download citation
DOI: https://doi.org/10.1007/11596042_93
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)