Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks

  • Authors:
  • Hongmei Deng;Anindo Mukherjee;Dharma P. Agrawal

  • Affiliations:
  • -;-;-

  • Venue:
  • ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

As various applications of wireless ad hoc networkhave been proposed, security has become one of the bigresearch challenges and is receiving increasing attention.In this paper, we propose a distributed key managementand authentication approach by deploying the recentlydeveloped concepts of identity-based cryptography andthreshold secret sharing. Without any assumption of prefixedtrust relationship between nodes, the ad hoc networkworks in a self-organizing way to provide the keygeneration and key management service, which effectivelysolves the problem of single point of failure in thetraditional public key infrastructure (PKI)-supportedsystem. The identity-based cryptography mechanism isapplied here not only to provide end-to-end authenticityand confidentiality, but also to save network bandwidthand computational power of wireless nodes.