2006
DOI: 10.1007/11814764_19
|View full text |Cite
|
Sign up to set email alerts
|

Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks

Abstract: Abstract. Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, proposed schemes do not provide mechanisms for key revocation and key renewal. In this paper, we propose the first key revocation and key renewal mechanisms for IBC schemes that are especially designed for MANETs. In our fully self-organized revocation scheme, each node monitors nodes in communication range and securely propagat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0
2

Year Published

2008
2008
2018
2018

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 10 publications
0
15
0
2
Order By: Relevance
“…Hoeper and Gong [12] presented a self-organized key revocation scheme for MANETs. In their scheme, each node uses a neighborhood watch scheme to monitor other nodes' behavior within its communication range.…”
Section: A Key Revocation Schemes In Menetsmentioning
confidence: 99%
See 3 more Smart Citations
“…Hoeper and Gong [12] presented a self-organized key revocation scheme for MANETs. In their scheme, each node uses a neighborhood watch scheme to monitor other nodes' behavior within its communication range.…”
Section: A Key Revocation Schemes In Menetsmentioning
confidence: 99%
“…2) Registration of network nodes: For the purpose of key revocation, we use the public key format Q i = H(ID i date version) for each node with identity ID i as introduced in [12], where date is the expiry date of the key and version is its version number. After the user ID i shows his credential and passes the authentication of the TTP, the TTP will derive his public key Q i and generate the corresponding ID-based private key d i = sQ i .…”
Section: B Step 1 Network Initializationmentioning
confidence: 99%
See 2 more Smart Citations
“…If a party A wishes to encrypt a message for B, he only needs to know Bs identifier and the system-wide public parameters; he need not have any relation with the TA to send the message, and need not authenticate B's public key. A number of authors have studied the applicability of IBE to MANETs [11], [6], [12], [9], [2].…”
Section: Introductionmentioning
confidence: 99%