Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
On Dynamic Distribution of Private Keys over MANETs
Electronic Notes in Theoretical Computer Science (ENTCS)
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
Journal of Parallel and Distributed Computing
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
Key management in ad hoc networks using self-certified public key system
International Journal of Mobile Communications
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Efficient key distribution scheme for secure routing in wireless mesh network environment
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
EURASIP Journal on Wireless Communications and Networking
A key management scheme for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An efficient identity-based group key agreement protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Distributed hierarchical key management scheme in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A hierarchical identity based key management scheme in tactical mobile ad hoc networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China
Key revocation for identity-based schemes in mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Improving the ID-Based key exchange protocol in wireless mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Security and Communication Networks
Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach
The Journal of Supercomputing
Content-location based key management scheme for content centric networks
Proceedings of the 6th International Conference on Security of Information and Networks
On a new-member-joining-protocol design using bivariate polynomials based DKG algorithms
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
As various applications of wireless ad hoc networkhave been proposed, security has become one of the bigresearch challenges and is receiving increasing attention.In this paper, we propose a distributed key managementand authentication approach by deploying the recentlydeveloped concepts of identity-based cryptography andthreshold secret sharing. Without any assumption of prefixedtrust relationship between nodes, the ad hoc networkworks in a self-organizing way to provide the keygeneration and key management service, which effectivelysolves the problem of single point of failure in thetraditional public key infrastructure (PKI)-supportedsystem. The identity-based cryptography mechanism isapplied here not only to provide end-to-end authenticityand confidentiality, but also to save network bandwidthand computational power of wireless nodes.