Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation

@inproceedings{Hoeper2006BootstrappingSI,
  title={Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation},
  author={Katrin Hoeper and G. Gong},
  year={2006}
}
In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of MANETs. As part of these schemes, we present the first key revocation and key renewing algorithms for… Expand
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Towards a fully self-organized identity-based key management system for MANETs
  • E. D. Silva, L. Albini
  • Computer Science
  • 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
  • 2013
On Dynamic Distribution of Private Keys over MANETs
Secure Ad-Hoc On-demand Distance Vector routing using identity based symmetric key management
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 40 REFERENCES
Threshold and identity-based key management and authentication for wireless ad hoc networks
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
Secure Key Issuing in ID-based Cryptography
Identity-Based Cryptosystems and Signature Schemes
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks
  • Katrin Hoeper, G. Gong
  • Computer Science
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
Identity based authenticated key agreement protocols from pairings
  • Liqun Chen, C. Kudla
  • Computer Science
  • 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.
  • 2003
Toward secure key distribution in truly ad-hoc networks
Self-securing ad hoc wireless networks
Key agreement in ad hoc networks
Key Agreement in Peer-to-Peer Wireless Networks
...
1
2
3
4
...