Enhancing MANET Security Using Secret Public Keys

Mobile ad hoc network (MANET) technology spreads widely in these days. It is suitable for environments that need on fly setup. A lot of challenges come with implementing these networks. The most sensitive challenge that MANET faces is the security issue. Traditional Public Key cryptography (PKC) and Identity based Cryptography (IBE) are slow and not suitable for these environments because of the nodes resources limitations. This paper is going to discuss the security of MANET using the PKI schemes in an efficient way. It will define new solution for securing MANET networks using a four keys security scheme. This solution provides a secure way for MANET nodes to authenticate each other and to secure data sent by each other.

[1]  D. Boneh Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .

[2]  Kenneth G. Paterson,et al.  A comparison between traditional public key infrastructures and identity-based cryptography , 2003, Inf. Secur. Tech. Rep..

[3]  Helen Tang,et al.  Strong Authentication for Tactical Mobile Ad Hoc Networks , 2007 .

[4]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Alexander May,et al.  Cryptanalysis of Unbalanced RSA with Small CRT-Exponent , 2002, CRYPTO.

[7]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[8]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[9]  Dan Boneh,et al.  Cryptanalysis of RSA with private key d less than N0.292 , 1999, IEEE Trans. Inf. Theory.

[10]  Ali Miri,et al.  Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.

[11]  Dan Boneh,et al.  Cryptanalysis of RSA with private key d less than N0.292 , 2000, IEEE Trans. Inf. Theory.

[12]  Michael J. Wiener,et al.  Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.

[13]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[14]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[15]  George C. Hadjichristofi,et al.  A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[16]  Alexander May,et al.  New Attacks on RSA with Small Secret CRT-Exponents , 2006, Public Key Cryptography.

[17]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .