Node Authentication Using BLS Signature in Distributed PKI Based MANETS
نویسندگان
چکیده
Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adopt it to MANET, the job of the CA must be distributed. The master secret key is shared among the nodes of the MANET, to self-organize the network without a central authority.The key is shared based on Shamir secret sharing scheme with bi-variate polynomial to make the MANET fully selfmanaged by nodes.In this paper, we considered PKI based scenario and proposed a new scheme to authenticate a node using BLS signature which is light weight compared to the existing schemes thus making it suitable for MANET.
منابع مشابه
Reviewing MANETs & Configurations of Certification Authority (CA) for node Authentication
A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deployed without the aid of any pre-existing infrastructure or centralized administration. But this fascinating technology is studded with a number of serious challenges that need to be well catered before its successful deployment. These challenges include security issues related to key management, routing, node ...
متن کاملA hybrid approach to secure hierarchical mobile IPv6 networks
Establishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability proble...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملChord-PKI: A distributed trust infrastructure based on P2P networks
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...
متن کاملEnhanced Onion Routing Framework for MANETs
The mobile ad hoc networks (MANETs) is wireless and dynamic topology network medium, which may suffer from many open security criticism. The major issue of mobile ad hoc networks (MANETs) is to send the data in secure manner from source to destination node in adversarial (opponent) environment such wireless node communication issues are node traffic, node attack and data accessing of intermedia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1708.08972 شماره
صفحات -
تاریخ انتشار 2017