A Hierarchical Key Management Scheme in Mobile Ad hoc Networks

Article Preview

Abstract:

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.

You have full access to the following eBook

Info:

Periodical:

Pages:

295-299

Citation:

Online since:

September 2011

Export:

Share:

Citation:

[1] C.L. Du, M.Z. Hu, H.L. Zhang, New group key management framework for mobile ad hoc network based on identity authentication in elliptic curve field, Journal on Communications. 28 (2007)53-59.

Google Scholar

[2] D.M. Yang, D.J. Mu, Z. Xu, Novel key management and authentication scheme for ad hoc space networks, Journal on Communications. 27(2006)104-107.

Google Scholar

[3] L. Zhou, Z.J. Hass, Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security. 113(1999)24-30.

Google Scholar

[4] H. Luo, P. Zerfos, J . Kong, et al. Self-Securing Ad Hoc Wireless Networks, Proceedings of the 7th IEEE Symposium on Computers and Communications , (2002)567-574.

DOI: 10.1109/iscc.2002.1021731

Google Scholar

[5] K. Fokin, Key Management in Ad Hoc Networks, 2008, http: /www. computer. org.

Google Scholar

[6] Y.C. Zhang, Y.D. Wang, et al. Distributed Key Management for Ad Hoc Network, J. Wuhan Univ. (Nat. Sci. Ed. ), 55(2009) 85-88.

Google Scholar

[7] A. Shamir, How to Share a Secret, Communications of ACM. 22(1979) 612-613.

DOI: 10.1145/359168.359176

Google Scholar

[8] H. Luo, S. Lu, Ubiquitous and Robust Authentication Services for Ad hoc Wireless network, Dept. of Computer Science, UCLA, TR-20030, (2000).

Google Scholar

[9] J. Kong, P. Zerfos, H. Luo, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, Proceedings of the IEEE 9th International Conference on Network Protocols, (2001)251-260.

DOI: 10.1109/icnp.2001.992905

Google Scholar

[10] J. Kong, P. Zerfos , H. Luo, et al. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, ACM Transactions on Networking. 12(2004)1049-1063.

DOI: 10.1109/tnet.2004.838598

Google Scholar

[11] William Stallings, et al. Cryptography and Network Security-Principles and Practices, Fourth Edition, Beijing, Publishing House of Electronics Industry, (2009).

Google Scholar