Identity-based key management

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile ad hoc networks (MANETs) are more vulnerable to security attacks compared to the wired networks mainly because they are wireless and dynamic in topology. It becomes very crucial to provide secured and efficient key management scheme as well as all the messages should also be secured. We hereby propose a scheme which provides secure identity-based key management which includes key generation using finger print data as identity of user and Key revocation. The proposed scheme reduces load on network and required computational time at receiver end by sending modified revocation list in accusation messages. Instead of sending entire accusation list, only changes in accusation list are sent. Also, any previous accusation from the current revoked node will be discarded. This results into increased efficiency and enhanced performance of system.

Cite

CITATION STYLE

APA

Ramanuj, P., & Shah, J. S. (2016). Identity-based key management. In Advances in Intelligent Systems and Computing (Vol. 438, pp. 199–206). Springer Verlag. https://doi.org/10.1007/978-981-10-0767-5_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free