A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load

Hoang Nam Nguyen, Hiroaki Morino

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Providing secure communications is a crucial task for the success of future ubiquitous mobile communication systems. Using public key infrastructure (PKI) is considered as a good solution to fulfill the task. However, as mobile ad hoc networks (MANET) inherit unique characteristics such as dynamic topology, non-infrastructure architecture, centralized PKI architectures are not suitable for dynamic MANET. The use of distributed PKI models is more appropriate but requires additional modifications to adapt with network changes. In this paper, we introduce a novel key management scheme for MANET, which exploits advantages of threshold cryptography. The major innovative aspect of this scheme is the use of temporal substitute certificate authorities (SCA), which form a PKI model of multi SCA groups. Performance results obtained by computer simulation show that the proposed key management scheme can reduce the latency of authentication, certificate update delay and the signaling load.

Original languageEnglish
Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
EditorsTomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence T. Yang
PublisherSpringer Verlag
Pages905-915
Number of pages11
ISBN (Print)3540308032, 9783540308034
DOIs
Publication statusPublished - 2005
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: 2005 Dec 62005 Dec 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
CountryJapan
CityNagasaki
Period05/12/605/12/9

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load'. Together they form a unique fingerprint.

  • Cite this

    Nguyen, H. N., & Morino, H. (2005). A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load. In T. Enokido, L. Yan, B. Xiao, D. Kim, Y. Dai, & L. T. Yang (Eds.), Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings (pp. 905-915). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS). Springer Verlag. https://doi.org/10.1007/11596042_93