Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks
نویسندگان
چکیده
We present two new schemes that, in the absence of a centralized support, allow a pair of nodes of a mobile ad hoc network to compute a shared key without communicating. Such a service is important to secure routing protocols [1–3]. The schemes are built using the well-known technique of threshold secret sharing and are secure against a collusion of up to a certain number of nodes. We evaluate and compare the performance of both the schemes in terms of the node admission and pairwise key establishment costs.
منابع مشابه
Bootstrapping Security in Personal Area Networks
Providing key pre-distribution in personal area networks (PANs) remains a challenging problem, in particular because of the unique characteristics of, and constraints on, such networks. Several key pre-distribution schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. In a ubiquitous environment, however, users with multiple personal wireless de...
متن کاملKey Distribution System for MANET with Minimum Prior Trust Relationship
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node m...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملA Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...
متن کاملToward Secure Key Distribution in Truly Ad-Hoc Networks
Ad-hoc networks — and in particular wireless mobile ad-hoc networks — have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular, it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represent...
متن کامل