Jun Zheng, Sanchun Xu, F. Zhao, Dianxin Wang, Yuanjun Li
{"title":"A novel detective and self-organized certificateless key management scheme in mobile ad hoc networks","authors":"Jun Zheng, Sanchun Xu, F. Zhao, Dianxin Wang, Yuanjun Li","doi":"10.1109/GrC.2013.6740452","DOIUrl":null,"url":null,"abstract":"The mobile ad-hoc network is an infrastructure-free and dynamic kind of network. For its mobility and self-organized features, it is a great challenge to ensure the security of the network. And the basic aspect of providing the security is managing the encrypting keys. The current key management schemes mainly depend on certificates and identity-based key encryption. Schemes based on certificates suffer from huge computational costs of certificates verification while the identity-based schemes lead to key escrow problem. In this paper, we propose a novel detective and self-organized key management by combining certificateless public key cryptography and threshold secret share scheme, which can completely perform key generation by nodes themselves and pick up the compromised node.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Granular Computing (GrC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GrC.2013.6740452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The mobile ad-hoc network is an infrastructure-free and dynamic kind of network. For its mobility and self-organized features, it is a great challenge to ensure the security of the network. And the basic aspect of providing the security is managing the encrypting keys. The current key management schemes mainly depend on certificates and identity-based key encryption. Schemes based on certificates suffer from huge computational costs of certificates verification while the identity-based schemes lead to key escrow problem. In this paper, we propose a novel detective and self-organized key management by combining certificateless public key cryptography and threshold secret share scheme, which can completely perform key generation by nodes themselves and pick up the compromised node.