Hsiao-Ching Lin, Ming-Kung Sun, Hui-Tang Lin, W. Kuo
{"title":"Multi-level and group-based key management for mobile ad hoc networks","authors":"Hsiao-Ching Lin, Ming-Kung Sun, Hui-Tang Lin, W. Kuo","doi":"10.1109/ISIC.2012.6449732","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks have unique features, such as variable topology and lack of centralized management, therefore key management faces additional difficulty for deployed in this environment. In this paper, a (n, t, n) secret sharing method is applied towards a group-based mobile ad hoc networks architecture to provide authentication and key management services. All nodes participate in key pair generation as shareholders using a threshold secret sharing scheme. This group-based network consists of multi-level participants. The nodes in different levels have different identities. The node identity in a higher-level subset is different from the larger common group. In the subset, shared information is broadcast efficiently and securely without risk of eavesdropping from larger group.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Mobile ad hoc networks have unique features, such as variable topology and lack of centralized management, therefore key management faces additional difficulty for deployed in this environment. In this paper, a (n, t, n) secret sharing method is applied towards a group-based mobile ad hoc networks architecture to provide authentication and key management services. All nodes participate in key pair generation as shareholders using a threshold secret sharing scheme. This group-based network consists of multi-level participants. The nodes in different levels have different identities. The node identity in a higher-level subset is different from the larger common group. In the subset, shared information is broadcast efficiently and securely without risk of eavesdropping from larger group.