Securing mobile ad hoc networks with certificateless public keys

Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang

Research output: Contribution to journalArticle

154 Citations (Scopus)

Abstract

This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.

Original languageEnglish (US)
Pages (from-to)386-399
Number of pages14
JournalIEEE Transactions on Dependable and Secure Computing
Volume3
Issue number4
DOIs
StatePublished - Oct 2006
Externally publishedYes

Fingerprint

Mobile ad hoc networks
Cryptography
Network security

Keywords

  • ID-based cryptography
  • Key management
  • Mobile ad hoc networks
  • Secret sharing
  • Security

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Networks and Communications

Cite this

Securing mobile ad hoc networks with certificateless public keys. / Zhang, Yanchao; Liu, Wei; Lou, Wenjing; Fang, Yuguang.

In: IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 4, 10.2006, p. 386-399.

Research output: Contribution to journalArticle

Zhang, Yanchao ; Liu, Wei ; Lou, Wenjing ; Fang, Yuguang. / Securing mobile ad hoc networks with certificateless public keys. In: IEEE Transactions on Dependable and Secure Computing. 2006 ; Vol. 3, No. 4. pp. 386-399.
@article{23cc96cd11bb48ee95fff34df37b104a,
title = "Securing mobile ad hoc networks with certificateless public keys",
abstract = "This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.",
keywords = "ID-based cryptography, Key management, Mobile ad hoc networks, Secret sharing, Security",
author = "Yanchao Zhang and Wei Liu and Wenjing Lou and Yuguang Fang",
year = "2006",
month = "10",
doi = "10.1109/TDSC.2006.58",
language = "English (US)",
volume = "3",
pages = "386--399",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Securing mobile ad hoc networks with certificateless public keys

AU - Zhang, Yanchao

AU - Liu, Wei

AU - Lou, Wenjing

AU - Fang, Yuguang

PY - 2006/10

Y1 - 2006/10

N2 - This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.

AB - This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.

KW - ID-based cryptography

KW - Key management

KW - Mobile ad hoc networks

KW - Secret sharing

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=33751529199&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33751529199&partnerID=8YFLogxK

U2 - 10.1109/TDSC.2006.58

DO - 10.1109/TDSC.2006.58

M3 - Article

AN - SCOPUS:33751529199

VL - 3

SP - 386

EP - 399

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 4

ER -