Securing Mobile Ad Hoc Networks with Certificateless Public Keys

@article{Zhang2006SecuringMA,
  title={Securing Mobile Ad Hoc Networks with Certificateless Public Keys},
  author={Yanchao Zhang and Wei E. I. Liu and Wenjing Lou and Yuguang Fang},
  journal={IEEE Transactions on Dependable and Secure Computing},
  year={2006},
  volume={3}
}
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management… CONTINUE READING
Highly Influential
This paper has highly influenced 18 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 201 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 131 extracted citations

Towards a fully self-organized identity-based key management system for MANETs

2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) • 2013
View 7 Excerpts
Highly Influenced

An Identity-Based Network Access Control Scheme for Single Authority MANETs

2010 IEEE Asia-Pacific Services Computing Conference • 2010
View 10 Excerpts
Highly Influenced

Efficient ID-based registration protocol featured with user anonymity in mobile IP networks

IEEE Transactions on Wireless Communications • 2010
View 8 Excerpts
Highly Influenced

Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks

2009 International Conference on Computational Science and Engineering • 2009
View 9 Excerpts
Highly Influenced

201 Citations

0102030'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 201 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 43 references

Authenticated routing for ad hoc networks

IEEE Journal on Selected Areas in Communications • 2005
View 9 Excerpts
Highly Influenced

Identity-Based Cryptosystems and Signature Schemes

CRYPTO • 1984
View 11 Excerpts
Highly Influenced

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

Y. Zhang, W. Liu, W. Lou, Y. Fang
technical report, Dept. of Electrical and Computer Eng., Univ. of Florida, Gainesville, Apr. 2006. • 2006
View 3 Excerpts
Highly Influenced

Threshold and identity-based key management and authentication for wireless ad hoc networks

International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. • 2004
View 4 Excerpts
Highly Influenced

URSA: ubiquitous and robust access control for mobile ad hoc networks

IEEE/ACM Transactions on Networking • 2004
View 15 Excerpts
Highly Influenced

Identify-Based Encryption from the Weil Pairing

D. Boneh, M. Franklin
SIAM J. Computing, vol. 32, no. 3, pp. 586-615, Mar. 2003. • 2003
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…