A Key Management Scheme Based on Double Matrix CPK for Mobile Ad Hoc Networks


Article Preview

A robust and efficient key management scheme is necessary for mobile ad hoc networks (MANETs) to ensure its security. CPK (Combined Public Key) is a recently developed public key algorithm, which has advantages comparing with other public key system, such as low storage overhead and calculation demand. Some key management approaches based on CPK have been proposed for MANETs in recent years. However, CPK is vulnerable to collusion attack which may bring about terrible threats. In this paper, a novel key management scheme based on double matrix CPK (DMCPK) is put forward, which is resistant to collusion attack. This key management scheme is described in details, including key generation and updating. Simulation experiments are implemented based on the simulation tool OPNET and show the effectiveness of the proposed scheme.



Edited by:

Zhu Zhilin & Patrick Wang




H. X. Li et al., "A Key Management Scheme Based on Double Matrix CPK for Mobile Ad Hoc Networks", Applied Mechanics and Materials, Vols. 40-41, pp. 543-548, 2011

Online since:

November 2010




[1] L. Zhou and Z. J. Haas: Securing Ad Hoc Networks, IEEE Networks, Vol. 13 (1999), pp.24-30.

DOI: 10.1109/65.806983

[2] Seung Yi, and Robin Kravets: Key Management for Heterogeneous Ad Hoc Wireless Networks, University of Illinois at Urbana-Champaign (2002).

[3] Kong J, Zerfos P, and Luo H: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, International Conference on Network Protocols, IEEE Computer Society (2001), pp.251-261.

DOI: 10.1109/icnp.2001.992905

[4] Nan Xianghao and Chen Zhong: A Profile to Network Security Techniques, National Defense Industry Press (2003), Beijing, pp.56-61.

[5] Yue Teng, Shoudao Wang, Yu Lin and Hongtu Li: Comparison of PKI IBE CPK, SCIENCE & TECHNOLOGY INFORMATION (2008), pp.402-403.

[6] Jianwei Liu, Chun Liu, Keqiang Guo: A KEY MANAGEMENT AND AUTHENTICATION MODEL FOR AD HOC NETWORK, the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2007).

DOI: 10.1109/pimrc.2007.4394799

[7] Ronglei Hu, Jianwei Liu, Qishan Zhang: cluster based key management scheme for ad hoc nerworks, Journal on Communicatios, Vol. 29 (2008), pp.223-228.

[8] Chengyong He, Fangwei Li: key management scheme for Ad hoc based on combined public key and secret sharing, Computer Engineering andd Applications, Vol. 45 (2009), pp.82-84.

[9] Meiling Zhao, Shaowu Zhang, security analysis of elliptic curve cryptography-based combined public key technique, Computer Engeneering, Vol. 4, NO. 1 (2008), pp.156-157.

[10] A. Shamir: How to Share a Secret. Communicatios of the ACM (1979).

[11] Chunyu Shao: A Double Matrix Combined Public Key Algorithm and Application Research, Zhengzhou Information Science and Technology Institute (2010), in press.

[12] Wei Dai: Crypto++Library 5. 1, http: /www. cryptopp. com (2007).

Fetching data from Crossref.
This may take some time to load.