Security bootstrapping of mobile ad hoc networks using identity-based cryptography

6Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Widespread utilization of mobile ad hoc networks, which communicate via broadcast wireless channels without any sort of infrastructure, raises security concerns. Introduction of identity-based cryptography shed some light to security problems of mobile ad hoc networks. Key management (KM) plays significant role in network security. Although many proposals are suggested for identity-based KM, they usually assume a trusted set of nodes during network initialization, which is not the case in many real-world applications. In this paper, a novel identity-based KM method is proposed, which utilizes Pedersen's verifiable secret sharing method. By distributing shared secret and key generation role among network nodes, the proposed method provides high levels of availability and scalability, while eliminating single point of failure. The proposed method provides a mechanism to check the validity of secret shares, which are generated by network nodes. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared with the performance of the existing methods. Copyright © 2016 John Wiley & Sons, Ltd.

Cite

CITATION STYLE

APA

Adli Mehr, K., & Musevi Niya, J. (2016). Security bootstrapping of mobile ad hoc networks using identity-based cryptography. Security and Communication Networks, 9(11), 1374–1383. https://doi.org/10.1002/sec.1423

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free