Security in Distributed and Networking Systems 2007
DOI: 10.1142/9789812770103_0013
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes

Abstract: In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of MANETs. As part of these schemes, we present the first key revocation and key renewing algorithms for IBC schemes. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(27 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…Existing RSS-based countermeasures use diverse antennas and Global Positioning System (GPS) technology. Some authors [31,32] use air monitors (AM) as an additional hardware device that sniffs the traffic passively to detect spoofing attacks on the MAC layer. However, this approach creates additional hardware overhead for the infrastructure-less 802.11 [27]-based ad hoc networks [31][32][33].…”
Section: Received Signal Strengthmentioning
confidence: 99%
“…Existing RSS-based countermeasures use diverse antennas and Global Positioning System (GPS) technology. Some authors [31,32] use air monitors (AM) as an additional hardware device that sniffs the traffic passively to detect spoofing attacks on the MAC layer. However, this approach creates additional hardware overhead for the infrastructure-less 802.11 [27]-based ad hoc networks [31][32][33].…”
Section: Received Signal Strengthmentioning
confidence: 99%
“…In [24], Balfe et al conceive of that in IBC infrastructures, entities from multiple TAs may well be gift inside a bigger coalition structure, with every Ta issuance crypto logic keys to entities in its own security domain supported the work of [25], [26], [11], [27], they propose a light-weight, generic and broadly speaking applicable framework enabling the refreshing of privates keys in coalition-forming things. They signifies their contribution is that the improvement upon the apparent approach of merely distributing new non-public keys by encrypting them mistreatment the previous public keys.…”
Section: Applications Of Ibc In Special-purpose Manet'smentioning
confidence: 99%
“…This work is based on their former work in [Hoeper and Gong 2006a], and the work of [Crepeau and Davis 2003;Luo et al 2002]. To enable key renewal in IBC schemes, they introduce a new format for ID-based public keys: Q i = H1(ID i ||t i ||v i ), where t i denotes the expiration date, and v i is the version number.…”
Section: · 21mentioning
confidence: 99%
“…Based on this work, in [Hoeper and Gong 2006a], the authors further present a MANET-IDAKE scheme in which a KGC initializes all devices before they join the network and all tasks are performed by the network nodes themselves without any central KGC. They suggest the of use MAC address as node identity.…”
Section: · 21mentioning
confidence: 99%