A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Communications of the ACM
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
CNSR '04 Proceedings of the Second Annual Conference on Communication Networks and Services Research
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
Identity-Based Threshold Key Management for Ad Hoc Networks
PACIIA '08 Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02
General-purpose Identity Hiding Schemes for Ad-hoc Networks
IUCE '09 Proceedings of the 2009 International Symposium on Intelligent Ubiquitous Computing and Education
ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
A new scheme for key management in ad hoc networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
MASK: anonymous on-demand routing in mobile ad hoc networks
IEEE Transactions on Wireless Communications
IEEE Network: The Magazine of Global Internetworking
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.00 |
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads to KM-SR interdependency cycle problem. In this paper, we propose a KM-SR integrated scheme that addresses KM-SR interdependency cycle problem. By using identity based cryptography (IBC), this scheme provides security features including confidentiality, integrity, authentication, freshness, and non-repudiation. Compared to symmetric cryptography, traditional asymmetric cryptography and previous IBC schemes, this scheme has improvements in many aspects. We provide theoretical proof of the security of the scheme and demonstrate the efficiency of the scheme with practical simulation.