Threshold and identity-based key management and authentication for wireless ad hoc networks


As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism is applied here not only to provide end-to-end authenticity and confidentiality, but also to save network bandwidth and computational power of wireless nodes.

DOI: 10.1109/ITCC.2004.1286434

Extracted Key Phrases

2 Figures and Tables


Citations per Year

147 Citations

Semantic Scholar estimates that this publication has 147 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@article{Deng2004ThresholdAI, title={Threshold and identity-based key management and authentication for wireless ad hoc networks}, author={Hongmei Deng and Anindo Mukherjee and Dharma P. Agrawal}, journal={International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.}, year={2004}, volume={1}, pages={107-111 Vol.1} }