Multi-level and group-based key management for mobile ad hoc networks

Mobile ad hoc networks have unique features, such as variable topology and lack of centralized management, therefore key management faces additional difficulty for deployed in this environment. In this paper, a (n, t, n) secret sharing method is applied towards a group-based mobile ad hoc networks architecture to provide authentication and key management services. All nodes participate in key pair generation as shareholders using a threshold secret sharing scheme. This group-based network consists of multi-level participants. The nodes in different levels have different identities. The node identity in a higher-level subset is different from the larger common group. In the subset, shared information is broadcast efficiently and securely without risk of eavesdropping from larger group.

[1]  Dimitrios D. Vergados,et al.  An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing , 2007, Wirel. Pers. Commun..

[2]  Dharma P. Agrawal,et al.  Level-based key establishment for multicast communication in mobile ad hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[3]  Chen Li-qing,et al.  Group Key Agreement Scheme for Mobile Ad Hoc Networks Based on Threshold Secret Sharing , 2010, 2010 Third International Symposium on Electronic Commerce and Security.

[4]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[5]  Seema Ansari,et al.  Certificateless ID-based authentication using threshold signature for P2P MANETs , 2009, 2009 International Conference on Information and Communication Technologies.

[6]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Lein Harn,et al.  Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[11]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[12]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..