A Certificateless Key Management Scheme in Moblie Ad Hoc Networks

被引:0
|
作者
Li, Lu [1 ]
Wang, Ze [1 ]
Liu, Wenju [1 ]
Wang, Yunlong [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
关键词
key management; MANETs; CL-PKC; threshold cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key management plays an important role in the security of today's information technology, especially in wireless and mobile environments like mobile ad hoc networks (MANETs) in which key management has received more and more attention for the difficulty to be implemented in such dynamic network. Traditional key management schemes are mainly based on PKI and identity-based public key cryptography (ID-PKC), which suffers from the computational costs of certificate verification and the key escrow problem. In this paper, we present a novel distributed key management scheme, a combination of certificateless public key cryptography (CL-PKC) and threshold cryptography, which not only eliminates the need for certificate-based public key distribution and the key escrow problem but also prevents single point of failure.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Secure and robust threshold key management (SRKM) scheme for ad hoc networks
    Hamouid, K.
    Adi, K.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 517 - 534
  • [22] Robust Key Management Scheme for Certification in Mobile Ad-hoc Networks
    Hamouid, K.
    Adi, K.
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 354 - +
  • [23] A key management scheme combined with intrusion detection for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Luan, Liangyu
    Li, Guorui
    Rong, Wang
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 584 - +
  • [24] Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
    Zhou J.
    Liu H.
    Zhou Y.
    Lyu Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 63 - 68
  • [25] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [26] A secure group key management scheme for hierarchical mobile ad hoc networks
    Huang, Dijiang
    Medhi, Deep
    AD HOC NETWORKS, 2008, 6 (04) : 560 - 577
  • [27] A scalable key management and clustering scheme for wireless ad hoc and sensor networks
    Li, Jason H.
    Bhattacharjee, Bobby
    Yu, Miao
    Levy, Renato
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2008, 24 (08): : 860 - 869
  • [28] A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks
    DU Hongzhen
    WEN Qiaoyan
    ZHANG Shanshan
    GAO Mingchu
    Chinese Journal of Electronics, 2021, 30 (05) : 947 - 955
  • [29] An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks
    Iqbal, Asad
    Zubair, Muhammad
    Khan, Muhammad Asghar
    Ullah, Insaf
    Ur-Rehman, Ghani
    Shvetsov, Alexey V.
    Noor, Fazal
    FUTURE INTERNET, 2023, 15 (08)
  • [30] An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks
    Computer Science and Engineering Dep., Thapar University, Patiala, Punjab, India
    Discrete Math. Theor. Comput. Sci., 1 (317-338):