In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based (ID-based) cryptography. Unfortunately, they both have some inherent drawbacks. In the public key cryptography system, a certificate authority (CA) is required to issue certificates between users' public keys and private keys to ensure their authenticity, whilst in an ID-based cryptography system, users' private keys are generated by a key generation center (KGC), which means the KGC knows every users' keys (the key escrow problem). To avoid these obstacles, Al-Riyami and Paterson proposed certificateless cryptography systems where the public keys do not need to be certified and the KGC does not know users' keys. Essentially, certificateless cryptography relies between the public key cryptography and ID-based cryptography. In this work, we adopt this system's advantage over MANET. To implement CL-PKE over MANET and to make it practical, we incorporate the idea of Shamir's secret sharing scheme. The master secret keys are shared among some or all the MANET nodes. This makes the system self-organized once the network has been initiated. In order to provide more flexibility, we consider both a full distribution system and a partial distribution system. Furthermore, we carry out two simulations to support our schemes. We firstly simulate our scheme to calculate our encryption, decryption and key distribution efficiency. Then we also simulate our scheme with AODV to test the network efficiency. The simulations are performed over OPNET.
[1]
Adi Shamir,et al.
Identity-Based Cryptosystems and Signature Schemes
,
1984,
CRYPTO.
[2]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[3]
Christian Bettstetter,et al.
Mobility modeling in wireless networks: categorization, smooth movement, and border effects
,
2001,
MOCO.
[4]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[5]
Kenneth G. Paterson,et al.
Certificateless Public Key Cryptography
,
2003
.
[6]
Takahiro Hara,et al.
AODV compatible routing with extensive use of cache information in ad-hoc networks
,
2002,
SAC '02.
[7]
Charles E. Perkins,et al.
Ad hoc On-Demand Distance Vector (AODV) Routing
,
2001,
RFC.
[8]
Zygmunt J. Haas,et al.
Securing ad hoc networks
,
1999,
IEEE Netw..
[9]
Matthew K. Franklin,et al.
Identity-Based Encryption from the Weil Pairing
,
2001,
CRYPTO.
[10]
Haiyun Luo,et al.
Self-securing ad hoc wireless networks
,
2002,
Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[11]
Johann van der Merwe,et al.
A survey on peer-to-peer key management for mobile ad hoc networks
,
2007,
CSUR.
[12]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.