Threshold key management protocol in mobile ad hoc networks using an ID-based signcryption scheme

Author(s):  
Zhang Chuanrong ◽  
Xiao Hong
2018 ◽  
Vol 7 (4.10) ◽  
pp. 344
Author(s):  
Shanmuganthan C ◽  
Raviraj P

Mobile Ad-hoc network (MANET) is an effective network administration framework that encourages trading data between remote mobile devices, without the utilization of remote access points and base stations. Security has become a major concern in mobile ad hoc networks. Providing security is the very big challenge in MANET, due to lack of infrastructure, frequent host mobility, and unreliable wireless media. We are using cryptography techniques to provide secure communication in mobile ad hoc networks. To provide security using cryptography, key management is playing a vital role. The key management includes key generation, storage, distribution, revocation, and updating. The authorized group key distributions are the difficult task in MANET. Various types of key management protocols are symmetric, asymmetric, group and hybrid. In a group key management, when a member joins or leaves the group, it needs to generate a new key immediately to maintain authentication or secrecy. The group key management is categorized into three types such as centralized, decentralized and distributed. In this paper, we analyze the performance of different group key management protocol scheme based on some important measure like reliability, limitations, services, storage cost, scalability, intermediate operation, and vulnerabilities. Finally, different categories of key management protocols compared and the results are tabulated  


2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


Sign in / Sign up

Export Citation Format

Share Document