Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
Cluster-based Group Key Agreement for Wireless Ad hoc Networks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
Context-aware cluster-based hierarchical protocol for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
ID-based key agreement with anonymity for ad hoc networks
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
An energy efficient clustering protocol for routing in Wireless Sensor Network
International Journal of Ad Hoc and Ubiquitous Computing
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
Privacy protection on Vehicular Ad hoc NETworks
International Journal of Ad Hoc and Ubiquitous Computing
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Identity-based key management in mobile ad hoc networks: techniques and applications
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Security support is a significant factor in ad hoc networks. Especially in dynamic topologies, considering clusters, key distribution, key agreement and key management are essential for providing a secure system. It is also necessary to protect the identities of individual nodes in wireless environments to avoid personal privacy concerns. However, many of the existing key agreement schemes for Mobile Ad Hoc Networks MANETs do not consider these security issues concurrently. This paper proposes privacy-preserving ID-based cluster key distribution and key agreement schemes for cluster-based MANETs and proves them in ID-mBJM model. To the best of our knowledge, our proposal is the first in which the anonymity property is combined with cluster-based MANETs. These schemes are secure against a wide variety of attacks and are suitable for privacy-preserving MANETs. Therefore, these schemes can be applied in many different kinds of cluster-based MANETs to protect user's privacy.