An ID-based node key management scheme based on PTPM in MANETs

In order to resolve the problems of node multiple keys management and protected storage in mobile ad hoc networks, a new identity-based node key management scheme combined with next generation protected storage of portable trusted platform module was presented for mobile ad hoc networks. In the scheme, the combined public key based on elliptic-curve cryptography was adopted to generate multiple keys, which were protected and managed by the next generation protected storage of portable trusted platform module. We show that our scheme is semantically secure under the elliptic-curve DDH assumption. Also, performance evaluation of proposed scheme in a real-world ad hoc network indicates the feasibility in practice. Copyright © 2015John Wiley & Sons, Ltd.

[1]  Xuefeng Zheng,et al.  An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[2]  Paz Morillo,et al.  Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.

[3]  Yang Xin,et al.  Efficient ID-based TPM key loading scheme for trusted platform , 2010 .

[4]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[5]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[6]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[7]  U. Maurer,et al.  A non-interactive public-key distribution system , 1996 .

[8]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[9]  Manju Khari,et al.  A Review on Key Management Schemes in MANET , 2012 .

[10]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[11]  Jianping Pan,et al.  Identity-based secure collaboration in wireless ad hoc networks , 2007, Comput. Networks.

[12]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[13]  Jiqiang Liu,et al.  A Portable TPM Scheme for General-Purpose Trusted Computing Based on EFI , 2009 .

[14]  Chu-Hsing Lin,et al.  Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[15]  Mahalingam Ramkumar,et al.  An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.

[16]  Zhen Han,et al.  A portable TPM based on USB key , 2010, CCS '10.

[17]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[18]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[19]  Michele Nogueira Lima,et al.  Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.

[20]  Dharma P. Agrawal,et al.  TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.

[21]  Hisham Dahshan,et al.  A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem , 2010, 2010 8th Annual Communication Networks and Services Research Conference.

[22]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[23]  Kaoru Kurosawa,et al.  k-Resilient Identity-Based Encryption in the Standard Model , 2004, CT-RSA.

[24]  Otto Carlos Muniz Bandeira Duarte,et al.  A lightweight group-key management protocol for secure ad-hoc-network routing , 2011, Comput. Networks.

[25]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[26]  Lei Han,et al.  Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[27]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[28]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[29]  Hatsukazu Tanaka A Realization Scheme for the Identity-Based Cryptosystem , 1987, CRYPTO.

[30]  Kaoru Kurosawa,et al.  k-Resilient Identity-Based Encryption in the Standard Model , 2004, CT-RSA.