ElGamal-like digital signature and multisignature schemes using self-certified public keys
Journal of Systems and Software
Communications of the ACM
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A survey and comparison on localisation algorithms for wireless ad hoc networks
International Journal of Mobile Communications
Building a wireless network infrastructure under budget constraints
International Journal of Mobile Communications
Wireless in the enterprise: requirements, solutions and research directions
International Journal of Mobile Communications
Adaptive rate controller for mobile ad hoc networks
International Journal of Mobile Communications
Location management for wireless networks: issues and directions
International Journal of Mobile Communications
IEEE Network: The Magazine of Global Internetworking
A meta-analysis of Mobile Commerce Research in China (2002 2006)
International Journal of Mobile Communications
Link longevity and mobility in self-dependent multi-hop mobile environments
International Journal of Mobile Communications
Secure human face authentication for mobile e-government transactions
International Journal of Mobile Communications
Hi-index | 0.00 |
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the self-certified public key system and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organising way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The using of self-certified public key system has the following advantages: (1) the storage space and the communication overheads can be reduced in that the certificate is unnecessary; (2) the computational costs can be decreased since it requires no public key verification; (3) there is no key escrow problem since the Certificate Authority (CA) does not know the users' private keys. As compared with the previous works, which were implemented with the certificate-based public key system and identity-based (ID-based) public key system, the proposed approach is more secure and efficient.