A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load

Hoang Nam Nguyen, Hiroaki Morino

研究成果: Conference contribution

6 引用 (Scopus)

抜粋

Providing secure communications is a crucial task for the success of future ubiquitous mobile communication systems. Using public key infrastructure (PKI) is considered as a good solution to fulfill the task. However, as mobile ad hoc networks (MANET) inherit unique characteristics such as dynamic topology, non-infrastructure architecture, centralized PKI architectures are not suitable for dynamic MANET. The use of distributed PKI models is more appropriate but requires additional modifications to adapt with network changes. In this paper, we introduce a novel key management scheme for MANET, which exploits advantages of threshold cryptography. The major innovative aspect of this scheme is the use of temporal substitute certificate authorities (SCA), which form a PKI model of multi SCA groups. Performance results obtained by computer simulation show that the proposed key management scheme can reduce the latency of authentication, certificate update delay and the signaling load.

元の言語English
ホスト出版物のタイトルEmbedded and Ubiquitous Computing - EUC 2005 Workshops
ホスト出版物のサブタイトルUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
ページ905-915
ページ数11
出版物ステータスPublished - 2005 12 1
イベントEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
継続期間: 2005 12 62005 12 9

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3823 LNCS
ISSN(印刷物)0302-9743
ISSN(電子版)1611-3349

Conference

ConferenceEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
Japan
Nagasaki
期間05/12/605/12/9

    フィンガープリント

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

これを引用

Nguyen, H. N., & Morino, H. (2005). A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load. : Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings (pp. 905-915). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3823 LNCS).