Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks

نویسندگان

  • Katrin Hoeper
  • Guang Gong
چکیده

Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, proposed schemes do not provide mechanisms for key revocation and key renewal. In this paper, we propose the first key revocation and key renewal mechanisms for IBC schemes that are especially designed for MANETs. In our fully self-organized revocation scheme, each node monitors nodes in communication range and securely propagates its observations. The public key of a node is revoked if a minimum number of nodes accused the node. To enable key renewal, we introduce a modified format for ID-based public keys, such that new keys can be issued for the same identity. The introduced revocation scheme is efficient because it uses pre-shared keys from the Weil pairing to secure accusation and revocation messages and messages are sent to an m-hop neighborhood instead of to the entire network. Our revocation mechanism can be adapted to PKI schemes in

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation

In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of ...

متن کامل

A Judgment Mechanism for Key Revocation

Key management is perhaps the most complex and most vulnerable part of any cryptographic implementation. To date key generation and activation have been extensively studied in the context of mobile ad hoc and wireless sensor networks. However, a dearth of research exists in designing techniques for key deactivation (revocation) and even less so for key reactivation. In this paper we study key-r...

متن کامل

Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis

This article proposes a parameterized trust model and security analysis framework for monitoring-based schemes that enables the identification of malicious nodes in mobile ad hoc networks (MANETs) and other decentralized networks. We utilize these results to design a practical decentralized key revocation scheme for MANETs in which nodes monitor their neighbors and securely propagate their obse...

متن کامل

Authentication and Key Exchange in Mobile Ad Hoc Networks

Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructureless wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Such networks are commonly refer...

متن کامل

EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts

Wireless ad hoc networks are self-configurable and autonomous networks and this type of networks serve as a good candidate to provide communications of many novel applications, including mission critical applications, mobile and pervasive computing, etc. Such networks are often composed of computation-constrained or resource-limited devices and without any underlying infrastructure. On the othe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006