{"title":"A Secure Encryption Protocol for Ad Hoc Networks","authors":"Xiaoming Wang, Zhiwei Liao","doi":"10.1109/ISISE.2010.144","DOIUrl":null,"url":null,"abstract":"A secure encryption protocol for mobile ad hoc networks is proposed based on cluster-based structure. In proposed scheme, we employ a one-way key chain and polynomial function as the basic means of constructing the encryption procedure in order to reduces the need for public key cryptography and shortage overhead. The proposed protocol avoids massive message exchanges for key setup that are sent during cluster members. Each cluster member is only required to receive messages to setup the cluster key, and hence can decrypt the encrypted message. The analysis of security and efficiency shows that the proposed scheme cannot only has the same advantages with broadcast encryption systems, but also can easily and efficiently add new cluster members and revoke malicious cluster members. Therefore, it is more efficient, and more practical protocol for mobile ad hoc networks.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Symposium on Information Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISISE.2010.144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A secure encryption protocol for mobile ad hoc networks is proposed based on cluster-based structure. In proposed scheme, we employ a one-way key chain and polynomial function as the basic means of constructing the encryption procedure in order to reduces the need for public key cryptography and shortage overhead. The proposed protocol avoids massive message exchanges for key setup that are sent during cluster members. Each cluster member is only required to receive messages to setup the cluster key, and hence can decrypt the encrypted message. The analysis of security and efficiency shows that the proposed scheme cannot only has the same advantages with broadcast encryption systems, but also can easily and efficiently add new cluster members and revoke malicious cluster members. Therefore, it is more efficient, and more practical protocol for mobile ad hoc networks.