2013
DOI: 10.12720/jcm.8.11.768-779
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks

Abstract: In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key generation and distribution. Subsequently, to build a more secure identity-based scheme for MANET, we recommend some tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 54 publications
0
6
0
Order By: Relevance
“…Most of the Key Management Schemes [12,11,2] were designed and proposed on Certificate-Based and ID-Based Cryptography System. In other words, the Certificate-Based Cryptosystems [12], the senders public key is verified and certified with a certificate that is issuing by CA ie Certification Authority.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Most of the Key Management Schemes [12,11,2] were designed and proposed on Certificate-Based and ID-Based Cryptography System. In other words, the Certificate-Based Cryptosystems [12], the senders public key is verified and certified with a certificate that is issuing by CA ie Certification Authority.…”
Section: Related Workmentioning
confidence: 99%
“…The effectiveness of Digital Certificates is the main reason to successfully considering the Public Key Cryptography. The Public Key Infrastructure, (PKI) is used to manage Digital Certificates, which proposed for Public Key Cryptography [12,11]. The prime component of Public Key Infrastructure is the Certificate Authority (CA), which guarantees the validity of Digital Certificates.…”
Section: Rsa Certificate-based Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…Nevertheless, the hardness of solving the ECDLP is stronger than the one of solving the bilinear Diffie–Hellman problem. It is worth pointing out that latest existing papers of signcryption schemes are mainly interesting to resource‐constrained environments such as ad hoc networks, wireless sensor networks, mobile computing and ubiquitous, and their algorithms focus on making the message secure in several receivers and maintaining a suitable authentication. Unlike these methods, which handle one message mapping to multiple receivers, our scheme deals with transmitting multiple signcryption information to various receivers and fulfilling the security requirements.…”
Section: Introductionmentioning
confidence: 99%