Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network

نویسندگان

  • Jeonil Kang
  • DaeHun Nyang
  • Aziz Mohaisen
  • Young-Geun Choi
  • KoonSoon Kim
چکیده

In ad hoc network, it is very crucial to issue certificates safely in the self-initialized scheme where the system authority exists only at the beginning of the network operation. In order to solve this problem, early studies have presented some suggestions by removing the system authority itself and using certificate chain, or by making nodes act as system authorities for issuing other nodes’ certificates. In this paper, using proxy and threshold signatures, we introduce a certificate issuing scheme that can solve many problems in the previously proposed solutions. We demonstrate our scheme’s performance through the simulation results. Also, we discuss the security value of our scheme’s in various aspects.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks

Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a threshold-multisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of ...

متن کامل

A Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks

Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...

متن کامل

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

Mobile ad-hoc networks are self-organizing as well as self configurable with an open network environment. The nodes during this network will be a part of can freely leave from the network. Therefore, the wireless and dynamic natures of MANET create them a lot of vulnerable in the direction of numerous varieties of security attacks than their wired counterparts. To ensure the secure network serv...

متن کامل

A Novel Security Scheme in VANET using ASIA

A vehicular ad hoc network (VANET) uses cars as mobile nodes in a MANET to create a mobile network. In the vehicular ad hoc networks the security is an important concern. For security purpose, Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs).This PKI system, the authentication of a received message is performed by checking if t...

متن کامل

Bilinear Pairings-Based Threshold Identity Authentication Scheme For Ad Hoc Network

Aiming at specific security threats in ad hoc network, this paper presents a bilinear pairings-based threshold identity authentication scheme without the trusted center. In this work, the security of certificate has been significantly enhanced by using improved GDH signature and interactive secret-sharing, that is, any attacker cannot forge a valid certificate for the untrusted nodes. The propo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007