A key management and secure routing integrated framework for Mobile Ad-hoc Networks

Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads to KM-SR interdependency cycle problem. In this paper, we propose a KM-SR integrated scheme that addresses KM-SR interdependency cycle problem. By using identity based cryptography (IBC), this scheme provides security features including confidentiality, integrity, authentication, freshness, and non-repudiation. Compared to symmetric cryptography, traditional asymmetric cryptography and previous IBC schemes, this scheme has improvements in many aspects. We provide theoretical proof of the security of the scheme and demonstrate the efficiency of the scheme with practical simulation.

[1]  Hyunsoo Yoon,et al.  On-demand secure routing protocol for ad hoc network using ID based cryptosystem , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[2]  Wonjun Lee,et al.  LSRP: A Lightweight Secure Routing Protocol with Low Cost for Ad-Hoc Networks , 2005, ICOIN.

[3]  Akshai Aggarwal,et al.  Against mobile attacks in Mobile Ad-hoc Networks , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[4]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[5]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[6]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[7]  Jouni Karvo,et al.  A Deployment Tool for Public Safety Ad-hoc Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[8]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[9]  Hung-Yu Chien,et al.  Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.

[10]  Yuchen Zhang,et al.  Identity-Based Threshold Key Management for Ad Hoc Networks , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[11]  Xi Chen,et al.  Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[12]  Wonjun Lee,et al.  ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks , 2005, IEICE Trans. Commun..

[13]  Akshai K. Aggarwal,et al.  PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks , 2010, Secur. Commun. Networks.

[14]  Richard A. Frost,et al.  A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.

[15]  Hung-Yu Chien,et al.  Identity-based key agreement protocol for mobile ad-hoc networks using bilinear pairing , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[16]  Daniele Rao,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .

[17]  Yuguang Fang,et al.  AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[20]  Ali Miri,et al.  Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.

[21]  Guangsong Li,et al.  A New Scheme for Key Management in Ad Hoc Networks , 2005, ICN.

[22]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[23]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[24]  Dharma P. Agrawal,et al.  TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.

[25]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[26]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[27]  Wonjun Lee,et al.  Optimizing Authentication Mechanisms Using ID-Based Cryptography in Ad Hoc Wireless Mobile Networks , 2004, ICOIN.

[28]  Ali Miri,et al.  An authenticated broadcasting scheme for wireless ad hoc network , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[29]  Mingtuo Zhou,et al.  Millimeter Wave Technology in Wireless PAN, LAN, and MAN , 2007 .

[30]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[31]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[32]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[33]  Wonjun Lee,et al.  ISSRP: A Secure Routing Protocol Using Identity-Based Signcryption Scheme in Ad-Hoc Networks , 2004, PDCAT.

[34]  Akshai Aggarwal,et al.  General-purpose Identity Hiding Schemes for Ad-hoc Networks , 2009, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.