An elliptic curve secret sharing key management scheme for mobile ad hoc networks

Hisham M.K. Dahshan, J. Irvine

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

In mobile ad hoc networks (MANETs), traditional security solutions are not adequate due to the infrastructureless nature and the absence of centralized administration. In this paper, a threshold key management scheme for MANETs is presented. The proposed scheme is implemented using elliptic curve dlog-based cryptosystem. In this scheme, an off-line central authority (CA) is required in the initialization phase before network deployment. The CA creates and preloads the shares matrix for each mobile node in the network initialization phase. Each session member generates its private/public key pair, and the session public key by collaborating with its trusted neighbors. The generation of the node private/public key pair, and the session public key is performed without any prior communication between session members. The advantages of the proposed scheme are justified through extensive timing and network simulations.
LanguageEnglish
Pages1405–1419
Number of pages15
JournalSecurity and Communication Networks
Volume4
Issue number12
DOIs
Publication statusPublished - Dec 2011

Fingerprint

Mobile ad hoc networks
Network security
Cryptography
Communication

Keywords

  • eliptic curve
  • in mobile ad hoc networks
  • cryptosystem
  • communications networks

Cite this

@article{a88070f7810340ccba77ff0d40bd6e6f,
title = "An elliptic curve secret sharing key management scheme for mobile ad hoc networks",
abstract = "In mobile ad hoc networks (MANETs), traditional security solutions are not adequate due to the infrastructureless nature and the absence of centralized administration. In this paper, a threshold key management scheme for MANETs is presented. The proposed scheme is implemented using elliptic curve dlog-based cryptosystem. In this scheme, an off-line central authority (CA) is required in the initialization phase before network deployment. The CA creates and preloads the shares matrix for each mobile node in the network initialization phase. Each session member generates its private/public key pair, and the session public key by collaborating with its trusted neighbors. The generation of the node private/public key pair, and the session public key is performed without any prior communication between session members. The advantages of the proposed scheme are justified through extensive timing and network simulations.",
keywords = "eliptic curve, in mobile ad hoc networks, cryptosystem , communications networks",
author = "Dahshan, {Hisham M.K.} and J. Irvine",
year = "2011",
month = "12",
doi = "10.1002/sec.270",
language = "English",
volume = "4",
pages = "1405–1419",
journal = "Security and Communication Networks",
issn = "1939-0114",
number = "12",

}

An elliptic curve secret sharing key management scheme for mobile ad hoc networks. / Dahshan, Hisham M.K.; Irvine, J.

In: Security and Communication Networks, Vol. 4, No. 12, 12.2011, p. 1405–1419.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An elliptic curve secret sharing key management scheme for mobile ad hoc networks

AU - Dahshan, Hisham M.K.

AU - Irvine, J.

PY - 2011/12

Y1 - 2011/12

N2 - In mobile ad hoc networks (MANETs), traditional security solutions are not adequate due to the infrastructureless nature and the absence of centralized administration. In this paper, a threshold key management scheme for MANETs is presented. The proposed scheme is implemented using elliptic curve dlog-based cryptosystem. In this scheme, an off-line central authority (CA) is required in the initialization phase before network deployment. The CA creates and preloads the shares matrix for each mobile node in the network initialization phase. Each session member generates its private/public key pair, and the session public key by collaborating with its trusted neighbors. The generation of the node private/public key pair, and the session public key is performed without any prior communication between session members. The advantages of the proposed scheme are justified through extensive timing and network simulations.

AB - In mobile ad hoc networks (MANETs), traditional security solutions are not adequate due to the infrastructureless nature and the absence of centralized administration. In this paper, a threshold key management scheme for MANETs is presented. The proposed scheme is implemented using elliptic curve dlog-based cryptosystem. In this scheme, an off-line central authority (CA) is required in the initialization phase before network deployment. The CA creates and preloads the shares matrix for each mobile node in the network initialization phase. Each session member generates its private/public key pair, and the session public key by collaborating with its trusted neighbors. The generation of the node private/public key pair, and the session public key is performed without any prior communication between session members. The advantages of the proposed scheme are justified through extensive timing and network simulations.

KW - eliptic curve

KW - in mobile ad hoc networks

KW - cryptosystem

KW - communications networks

UR - http://www.scopus.com/inward/record.url?scp=81855194780&partnerID=8YFLogxK

U2 - 10.1002/sec.270

DO - 10.1002/sec.270

M3 - Article

VL - 4

SP - 1405

EP - 1419

JO - Security and Communication Networks

T2 - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 12

ER -