A key management scheme for ad hoc networks

  • Authors:
  • Zeng Ping;Hu Ronglei;Fang Yong;Yang Jianxi;Liu Yue

  • Affiliations:
  • Department of Communication Engineering, Beijing Electronic science and Technology institute, Beijing, China;Department of Communication Engineering, Beijing Electronic science and Technology institute, Beijing, China;Department of Communication Engineering, Beijing Electronic science and Technology institute, Beijing, China;Department of Communication Engineering, Beijing Electronic science and Technology institute, Beijing, China;Department of Communication Engineering, Beijing Electronic science and Technology institute, Beijing, China

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

With initial trust in the system model, a new identity-based distributed key management scheme is proposed. Verifiable secret sharing technology and blind short signatures are applied into this scheme. The scheme is composed of system initialization, update of a node's private key, share refreshing of system private key, discover of malicious node and key revocation. The model with initial trust makes the scheme more secure. The overhead of storage, communication and computation are reduced since the identity-based public key system is used. The verifiable secret share technology effectively prevents the node from behaving dishonestly. The update scheme of a node's private key provides mutual authentication. The blind short signature ensures the share of private key can be transmitted in the unsecured channel. The key revocation is simple and convenient since the valid time is added to the key. The analysis shows that the proposed scheme not only provides greater security, but also improves the efficiency than previous scheme for ad hoc networks.