Providing secure communications in mobile ad hoc networks (MANET) is an important and difficult problem, due to a lack of a key management infrastructure. The authentication is an important security service in (MANETs). To provide a node authentication service we use a fully distributed certificate authorities (FDCA) based on the threshold cryptography. In this paper we propose an efficient and verifiable multi secret sharing scheme in cluster-based MANET with a low computation system. Our scheme is based on the overdetermined linear system equation in Galois fields GF(2r). We have analyzed our scheme based on security and performance criteria, and compared with existing approaches. The efficiency of our proposed schemes was verified and evaluated by simulation. Simulation results show that this approach is scalable.
REFERENCES(24)
1.
Khurana S., Gupta N. and Aneja N. Minimum exposed path to the attack (MEPA) in mobile ad hoc network (MANET). In: Networking, ICN ‘07. Sixth International Conference on, 2007.
Hongmei D., Mukherjee A. and Agrawal D.P. Threshold and identity-based key management and authentication for wireless ad hoc networks. In: Information Technology: Coding and Computing. Proceedings ITCC 2004. International Conference on, 2004.
Dong Y. et al. Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Comput. Communic., 30(11–12), 2007, 2442–2452.
Lung-Chung L. and Ru-Sheng L. Securing cluster-based ad hoc networks with distributed authorities. Wireless Communications, IEEE Transactions on, 9(10), 2010, 3072–3081.
Seung Y. and Robin K. Moca: Mobile certificate authority for wireless ad hoc networks. In: The second anunual PKI research workshop (PKI ‘03). Gaithersburg 2003.
Xianyong M. and Yangmin L. A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network. In: Automation and Logistics (ICAL), IEEE International Conference on. 2012.
Neha G. and Manish S. Securing routing protocol by distributed key management and threshold cryptography in mobile ad hoc network. International Journal of Advanced Computer Research, 3(9), 2013.
Dahshan H. and Irvine J. A trust based threshold cryptography key management for mobile ad hoc networks. In: Vehicular Technology Conference Fall (VTC 2009-Fall), IEEE 70th, 2009.
Zhang Y., Liu Z. and Huang G. Sure interpolation and its application to hierarchical threshold secret sharing scheme. In: Computer Science and Computational Technology. ISCSCT ‘08. International Symposium on, 2008.
Yang G. et al. (k, n) threshold secret sharing scheme based on n-dimensional cube. In: Z. Zhong (Ed.) Proceedings of the International Conference on Information Engineering and Applications (IEA 2012). Springer, London 2013, 611–618.
Wang S.-J., Tsai Y.-R. and Shen C.-C. Verifiable threshold scheme in multi-secret sharing distributions upon extensions of ECC. Wireless Personal Communications, 56(1), 2011, 173–182.
Tentu A. and Rao A. Efficient verifiable multi-secret sharing based on Y.C.H scheme. In: Z. Kotulski, B. Księżopolski and K. Mazur (Eds.) Cryptography and Security Systems. Springer, Berlin–Heidelberg 2014, 100–109.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.