Identity-Based Threshold Key Management for Ad Hoc Networks

  • Authors:
  • Yuchen Zhang;Jing Liu;Yadi Wang;Jihong Han;Hengjun Wang;Kun Wang

  • Affiliations:
  • -;-;-;-;-;-

  • Venue:
  • PACIIA '08 Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no aid of any established infrastructure, which, however, is commonly susceptible to various attacks. The relevant researches for Ad hoc networks have been currently focused on these aspects mentioned above to further solve various security problems. In this contribution, we briefly survey previous works regarding key management for Ad hoc networks, and then introduce the secret sharing and pairing technique related to this point. Following this lead, we further propose an identity-based threshold key management scheme for Ad hoc networks, which includes key generation, key distribution, and key update services. Moreover, we also evaluate the performance of above scheme.