Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Identity-based ring signatures from RSA
Theoretical Computer Science
Identity-Based Threshold Key Management for Ad Hoc Networks
PACIIA '08 Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02
The three-layered group key management architecture for MANET
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Key agreement in ad hoc networks
Computer Communications
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
MANET(Moving Ad hoc Network) is a convenient infrastructure-less communication network which is commonly susceptible to various attacks. Many key management schemes for MANETs are presented to solve various security problems. Identity (ID)-based cryptography with threshold secret sharing, ECC and Bilinear Pairing computation is a popular approach for the key management design. In this article, we adopt these approaches to construct tree structure and cluster structure ad hoc network which has three level security communication framework. After constructing the security structure, we evaluate the security performance and efficiency of the scheme in detail.