Multicast operation of the ad-hoc on-demand distance vector routing protocol
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Ad Hoc Networking
IEEE Network: The Magazine of Global Internetworking
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
Information Security and Cryptology
Hi-index | 0.00 |
Robust key management is one of the most crucial technologies for security of ad hoc networks. In this paper, a new scheme for key management is proposed using identity-based (ID-based) signcryption and threshold cryptography. It enables flexible and efficient key management while respecting the constraints of ad hoc networks. In our new scheme, public key certificates are not needed and every client uses its identity as its public key. It greatly decreases the need of computing and storage abilities of clients' terminals, as well as communication cost for system key management.