Identity Based Encryption Using Multiple Trust Authorities in Ad Hoc Networks
نویسنده
چکیده
Ad hoc networks are becoming more and more popular as the use of mobile computing devices increases. While ad hoc networks have many advantageous properties, they also pose several security challenges which are unique to networks of this kind. One of the main challenges that ad hoc networks have to face is authentication. Authentication is difficult to achieve in ad hoc networks because some type of key distribution system is needed to develop the authentication mechanism. Public key cryptosystems are a possible solution to this challenge, but then a certain level of trust must be established before the keys may be used. In many cases this can be accomplished using a certificate authority or central trust authority. However, this brings about many contradictions to the properties of ad hoc networks. This paper will present some of the security challenges and opportunities encountered when utilizing ad hoc networks. Security attributes will be discussed so that the security of a network may be evaluated. Following the discussion of the security attributes, identity based encryption schemes based on the Weil pairing, presented by Boneh and Franklin in [1], will be presented. Identity based encryption will then be enhanced using the idea of multiple trust authorities, which was presented originally by Chen et al in [2]. Finally, ad hoc networks using multiple trust authorities in an identity based encryption scheme will be discussed. Throughout the paper two examples (sections 2.3 and 2.4) will be used to illustrate the ideas of [1], [2], and their applications to ad hoc networks.
منابع مشابه
Self-Managed Heterogeneous Certification in Mobile Ad Hoc Networks
As mobile ad hoc networks grow into a pervasive computing infrastructure, it is commonplace for wireless nodes owned by different entities to collaborate and communicate with one another. However, in cases where identity authentication is required to secure the communications, a new problem will be raised. On one hand, certificates of different nodes are possibly issued by different Certificate...
متن کاملKey Distribution System for MANET with Minimum Prior Trust Relationship
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node m...
متن کاملAuthentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks
Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH an...
متن کاملBroadcast Encryption with Multiple Trust Authorities
In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with multiple, independent Trusted Authorities each with their own WIBE. In this multi-trust-authority WIBE environment, a group of TA’s may form coalitions, enabling secure communication across domains. These coalitions can be created...
متن کاملPseudonym-based cryptography for anonymous communications in mobile ad hoc networks
Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication session. This assumption is impractical for many ad hoc scenarios where pairwise shared keys are difficult to be set up in advance. Public-key b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004