Abstract
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.
Original language | English (US) |
---|---|
Pages (from-to) | 386-399 |
Number of pages | 14 |
Journal | IEEE Transactions on Dependable and Secure Computing |
Volume | 3 |
Issue number | 4 |
DOIs | |
State | Published - Oct 2006 |
Externally published | Yes |
Fingerprint
Keywords
- ID-based cryptography
- Key management
- Mobile ad hoc networks
- Secret sharing
- Security
ASJC Scopus subject areas
- Engineering(all)
- Computer Networks and Communications
Cite this
Securing mobile ad hoc networks with certificateless public keys. / Zhang, Yanchao; Liu, Wei; Lou, Wenjing; Fang, Yuguang.
In: IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 4, 10.2006, p. 386-399.Research output: Contribution to journal › Article
}
TY - JOUR
T1 - Securing mobile ad hoc networks with certificateless public keys
AU - Zhang, Yanchao
AU - Liu, Wei
AU - Lou, Wenjing
AU - Fang, Yuguang
PY - 2006/10
Y1 - 2006/10
N2 - This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.
AB - This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs.
KW - ID-based cryptography
KW - Key management
KW - Mobile ad hoc networks
KW - Secret sharing
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=33751529199&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751529199&partnerID=8YFLogxK
U2 - 10.1109/TDSC.2006.58
DO - 10.1109/TDSC.2006.58
M3 - Article
AN - SCOPUS:33751529199
VL - 3
SP - 386
EP - 399
JO - IEEE Transactions on Dependable and Secure Computing
JF - IEEE Transactions on Dependable and Secure Computing
SN - 1545-5971
IS - 4
ER -