Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Identity-Based Key Management in MANETs Using Public Key Cryptography
Anil Kumar Kapil, Sanjeev Kumar Rana
Pages - 1 - 8 | Revised - 20-02-2009 | Published - 15-03-2009
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
MANATs, security, cryptography
ABSTRACT
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services including digital certificates, authentication and encryption. In the proposed scheme, a secure identity-based key management scheme is proposed for networks in environments without any PKI. This scheme solved the security problem in the MANET and is suitable for application to other wired network structures
1 | Rajni, M., & Reena, M. (2014). Review of MANETS Using Distributed Public-key Cryptography. arXiv preprint arXiv:1405.0100. |
2 | Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática). |
3 | Rajni, M., Reena, M., & Reena, M. Nav view search. |
4 | Ramachandran, S., & Lavanya, S. A Cluster based Cost Effective Group Key Management Protocol for Multicast Network. |
5 | Muthusamy, S. K., Thiyagarajan, P., & Selvaraj, L. (2013). An enhanced and cost effective group key management scheme for multicast network. Journal of Computer Science, 9(4), 477. |
6 | El-Sayed, A. (2013). Clustering Based Group Key Management for MANET. In Advances in Security of Information and Communication Networks (pp. 11-26). Springer Berlin Heidelberg. |
7 | Kumar, S., Purusothaman, N. M., & Lavanya, S. (2013). Design and performance analysis of scalable and efficient group key Management scheme [SEGKMS] for group communication in multicast networks. Life Science Journal, 10(2). |
8 | Islam, N., & Shaikh, Z. A. (2013). Security Issues in Mobile Ad Hoc Network. In Wireless Networks and Security (pp. 49-80). Springer Berlin Heidelberg. |
9 | Kushwah, V. S., & Sharma, G. (1985). Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network. International Journal of Computer Science and Security, 4(6), 551. |
10 | Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. A Fuzzy QOS Key Base Secured MANET Routing with Multipath Data Fragmentation (FQKSMR). |
11 | Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165. |
12 | Azeez, A., & Preetha, K. G. (2012, October). A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution. In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (pp. 52-56). ACM. |
13 | Kumar, N. S., & Purusothaman, T. (2012). SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks. European Journal of Scientific Research, 89(3), 394-408. |
14 | Ling, A. P. A., & Masao, M. (2011). Grid Information Security Functional Requirement-Fulfilling Information Security of a Smart Grid System. arXiv preprint arXiv:1108.0267. |
15 | Pal, O., Saxena, A., Kumawat, U., Batra, R., & Saquib, Z. (2011). Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography. In Computer Networks and Information Technologies (pp. 498-503). Springer Berlin Heidelberg. |
16 | Ferraz, L. H. G. (2011). Um mecanismo de exclusao acurado e preciso baseado em confiança para controle de acesso em redes ad hoc (Doctoral dissertation, Universidade Federal do Rio de Janeiro). |
17 | Gadiparthi, M., Vejendla, M., Paladugu, R., & Rao, P. N. (2011). A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network. Wireless Communication, 3(2), 95-102. |
18 | Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE. |
19 | Aboud, S. J. (2009). Secure E-payment Protocol. International Journal of Computer Science and Security, 3(3). |
1. David B. Johnson, David A. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)", IETF Mobile Ad Hoc Networks Working Group, Internet Draft, 15 April 2003. | |
10. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Adhoc Networks”, In Proceeding of IEEE Int’l Conf. Network Protocols, Nov. 2001 | |
11. M. Narasimha, G. Tsudik, and J.H. Yi, “On the Unitility of Distributed Cryptography in P2P and Manets: The Case of Membership Control”, In Proceeding of IEEE Int’l Conf. Network Protocols Nov. 2003 | |
12. S. Yi and R. Kravets, “Moca: Mobile Certificate Authority Wireless Ad Hoc Networks”, In Proceeding of Second Ann. PKI Research Workshop (PKI ’03), Apr. 2003 | |
12. S. Yi and R. Kravets, “Moca: Mobile Certificate Authority Wireless Ad Hoc Networks”, In Proceeding of Second Ann. PKI Research Workshop (PKI ’03), Apr. 2003 | |
13. M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, “A Cluster-Based Security Architecture for Ad Hoc Networks”, In Proceeding IEEE INFOCOM, Mar. 2004 | |
14. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks”, IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004 | |
15. Shamir, "Identity-based cryptosystems and signature schemes", in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer, pp. 47-53, Springer-Verlag, 1984. | |
16. M. Bohio, and A. Miri, "An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network", In Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR '04), IEEE Computer Society, pp. 6974, May 19-21, 2004. | |
17. A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad Hoc Networks", 2003 Symposium on Applications and the Internet Workshop (SAINT 2003), IEEE Computer Society, pp. 342-346, 2003. | |
18. H. Deng, A. Mukherjee, and D. Agrawal, “Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks”, In Proceeding Int’l Conf. Information Technology: Coding and Computing (ITCC ’04), Apr. 2004 | |
19. N. Saxena, G. Tsudik, and J.H. Yi, “ Identity-Based Access Control for Ad Hoc Groups”, In Proceeding of International Conference of Information Security and Cryptology, Dec. 2004 | |
2. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L Viennot, "Optimized Link State Routing Protocol for Ad Hoc Networks", In Proceeding of IEEE Int'l MulU Topic Con!. 2001, IEEE Press, pp. 62-68, 2001. | |
20. Y. Zhang, W. Liu, W. Lou, Y. Fang, and Y. Kwon, “AC-PKI Anonymous and Certificateless Public-Key Infrastructure for Mobile Ad Hoc Networks”, In Proceeding of IEEE Int’l Conf. Comm pp. 3515-3519, May 2005 | |
21. A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979 | |
22. Y. Desmedt and Y. Frankel, “Threshold Cryptosystems”, In Proceeding of CRYPTO ’89, pp. 307-315, Aug. 1989. | |
23. R. L. Rivest, A. Shamir, and L. Adelman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Comm. Of ACM Vol.21, no.2, pp. 122-126, 1978. | |
3. Nikola Milanovic, Miroslaw Malek, Anthony Davidson and Veljko Milutinovic, "Routing and Security in Mobile Ad Hoc Networks", IEEE Computer. Vol. 37, No.2, pp. 61-65, February 2004. | |
5. A.Weimerskirch, and D. Westhoff, "Identity Certified Authentication for Ad Hoc Networks", 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 33-40, October 31, 2003. | |
6. menezes, P. V. Oorschot, and S. A. Vanstone, “handbook of Applied Cryptography”, CRC Press, New York, 1997 | |
7. B. Newman and T. Tso. , “Kerberos: An Authentication Service for Computer Networks”, vol. 32, no. 9, pp. 33-38, Sept. 1994 | |
8. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks", In Proceeding of the IEEE 9th International Conference on Network Protocols (ICNP'01), IEEE Computer Society, pp. 251, 2001. | |
9. H. Deng, A. MukheIjee, and D.P. Agrawal, "Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks", In Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE Computer Society, Vol. 1, No.1, pp. 107-111, January 2004. | |
L. Zhou, and Z. J. Haas, "Securing Ad Hoc Networks", IEEE Network Journals, Vol. 13, No.6, pp. 24-30, 1999. | |
Professor Anil Kumar Kapil
MMICT&BM, mullana - India
anil_kdk@yahoo.com
Mr. Sanjeev Kumar Rana
M M Engg college - India
|
|
|
|
View all special issues >> | |
|
|