scispace - formally typeset
Proceedings ArticleDOI

Threshold and identity-based key management and authentication for wireless ad hoc networks

Hongmei Deng, +2 more
- Vol. 1, pp 107-111
TLDR
This paper proposes a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system.
Abstract
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism is applied here not only to provide end-to-end authenticity and confidentiality, but also to save network bandwidth and computational power of wireless nodes.

read more

Citations
More filters
Journal ArticleDOI

A survey on peer-to-peer key management for mobile ad hoc networks

TL;DR: The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs) and discusses and provides comments on the strategy of each group separately.
Patent

Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption

TL;DR: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks, was presented in this article.
Journal ArticleDOI

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

TL;DR: IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information, which eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public- key management schemes.
Patent

Encryption key fragment distribution

TL;DR: An encryption key may be fragmented into n encryption key fragments such that k
Patent

Extensible authentication management

TL;DR: In this article, a system and method for controlling access to a resource permits an administrator to make changes to access policies at a server level without having to update client code unless and until such updated code is actually needed by a client.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Book ChapterDOI

Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing

TL;DR: It is shown how to distribute a secret to n persons such that each person can verify that he has received correct information about the secret without talking with other persons.