Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network
نویسندگان
چکیده
In ad hoc network, it is very crucial to issue certificates safely in the self-initialized scheme where the system authority exists only at the beginning of the network operation. In order to solve this problem, early studies have presented some suggestions by removing the system authority itself and using certificate chain, or by making nodes act as system authorities for issuing other nodes’ certificates. In this paper, using proxy and threshold signatures, we introduce a certificate issuing scheme that can solve many problems in the previously proposed solutions. We demonstrate our scheme’s performance through the simulation results. Also, we discuss the security value of our scheme’s in various aspects.
منابع مشابه
A Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a threshold-multisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of ...
متن کاملA Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...
متن کاملEnergy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks
Mobile ad-hoc networks are self-organizing as well as self configurable with an open network environment. The nodes during this network will be a part of can freely leave from the network. Therefore, the wireless and dynamic natures of MANET create them a lot of vulnerable in the direction of numerous varieties of security attacks than their wired counterparts. To ensure the secure network serv...
متن کاملA Novel Security Scheme in VANET using ASIA
A vehicular ad hoc network (VANET) uses cars as mobile nodes in a MANET to create a mobile network. In the vehicular ad hoc networks the security is an important concern. For security purpose, Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs).This PKI system, the authentication of a received message is performed by checking if t...
متن کاملBilinear Pairings-Based Threshold Identity Authentication Scheme For Ad Hoc Network
Aiming at specific security threats in ad hoc network, this paper presents a bilinear pairings-based threshold identity authentication scheme without the trusted center. In this work, the security of certificate has been significantly enhanced by using improved GDH signature and interactive secret-sharing, that is, any attacker cannot forge a valid certificate for the untrusted nodes. The propo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007