An authenticated broadcasting scheme for wireless ad hoc network

We propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme that suggested an identity-based cryptosystem for ad hoc networks. Due to the dynamic nature of ad hoc networks, we allow nodes to generate their own broadcast keys for different groups in the network, and change those when associated groups are changed. However, we ensure through our signcryption scheme that broadcast keys are implicitly controlled by the trusted authority (TA), and can be used for as long as the private keys are issued. Our keys are based on identities and do not use certificates. We also propose a non-probabilistic method for computing unique broadcast keys for different groups. We use identity-based pairwise symmetric keys as the building block for our broadcast scheme. Such keys are computed non-interactively by the nodes, which reduces communication overhead and simplifies key management in pairwise communication.

[1]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[2]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[3]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[6]  Ulf Carlsen Optimal privacy and authentication on a portable communications system , 1994, OPSR.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Hatsukazu Tanaka A Realization Scheme for the Identity-Based Cryptosystem , 1987, CRYPTO.

[9]  Colin Boyd,et al.  Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.

[10]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[11]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[12]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[13]  Hyunsoo Yoon,et al.  Accelerating Key Establishment Protocols for Mobile Communication , 1999, ACISP.

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Paulo S. L. M. Barreto,et al.  On the Selection of Pairing-Friendly Groups , 2003, Selected Areas in Cryptography.

[16]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[17]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[18]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[19]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[20]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[21]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..