Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Exact and approximate algorithms for partially observable markov decision processes
Exact and approximate algorithms for partially observable markov decision processes
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Localized Operations for Distributed Minimum Energy Multicast Algorithm in Mobile Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
Continuous Verification Using Multimodal Biometrics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Partially Observed Markov Decision Process Multiarmed Bandits---Structural Results
Mathematics of Operations Research
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Joint authentication and quality of service provisioning in cooperative communication networks
Computer Communications
Hi-index | 0.01 |
In mobile ad hoc networks (MANETs), identity (ID)-based cryptography with threshold secret sharing is a popular approach for the security design. Most previous work for key management in this framework concentrates on the protocols and structures. Consequently, how to optimally conduct node selection in ID-based cryptography with threshold secret sharing is largely ignored. In this paper, we propose a distributed scheme to dynamically select nodes with master key shares to do the private key generation service. The proposed scheme can minimize the overall threat posed to the MANET while simultaneously taking into account of the cost (e.g., energy consumption) of using these nodes. Intrusion detection systems are modeled as noisy sensors to derive the system security situations. We use stochastic system to formulate the MANET to obtain the optimal policy. Simulation results are presented to illustrate the effectiveness of the proposed scheme.