Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Identity-Based Key Management in MANETs Using Public Key Cryptography
Anil Kumar Kapil, Sanjeev Kumar Rana
Pages - 1 - 8     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3   Issue - 1    |    Publication Date - February 2009  Table of Contents
MANATs, security, cryptography
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services including digital certificates, authentication and encryption. In the proposed scheme, a secure identity-based key management scheme is proposed for networks in environments without any PKI. This scheme solved the security problem in the MANET and is suitable for application to other wired network structures
CITED BY (19)  
1 Rajni, M., & Reena, M. (2014). Review of MANETS Using Distributed Public-key Cryptography. arXiv preprint arXiv:1405.0100.
2 Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática).
3 Rajni, M., Reena, M., & Reena, M. Nav view search.
4 Ramachandran, S., & Lavanya, S. A Cluster based Cost Effective Group Key Management Protocol for Multicast Network.
5 Muthusamy, S. K., Thiyagarajan, P., & Selvaraj, L. (2013). An enhanced and cost effective group key management scheme for multicast network. Journal of Computer Science, 9(4), 477.
6 El-Sayed, A. (2013). Clustering Based Group Key Management for MANET. In Advances in Security of Information and Communication Networks (pp. 11-26). Springer Berlin Heidelberg.
7 Kumar, S., Purusothaman, N. M., & Lavanya, S. (2013). Design and performance analysis of scalable and efficient group key Management scheme [SEGKMS] for group communication in multicast networks. Life Science Journal, 10(2).
8 Islam, N., & Shaikh, Z. A. (2013). Security Issues in Mobile Ad Hoc Network. In Wireless Networks and Security (pp. 49-80). Springer Berlin Heidelberg.
9 Kushwah, V. S., & Sharma, G. (1985). Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network. International Journal of Computer Science and Security, 4(6), 551.
10 Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. A Fuzzy QOS Key Base Secured MANET Routing with Multipath Data Fragmentation (FQKSMR).
11 Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165.
12 Azeez, A., & Preetha, K. G. (2012, October). A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution. In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (pp. 52-56). ACM.
13 Kumar, N. S., & Purusothaman, T. (2012). SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks. European Journal of Scientific Research, 89(3), 394-408.
14 Ling, A. P. A., & Masao, M. (2011). Grid Information Security Functional Requirement-Fulfilling Information Security of a Smart Grid System. arXiv preprint arXiv:1108.0267.
15 Pal, O., Saxena, A., Kumawat, U., Batra, R., & Saquib, Z. (2011). Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography. In Computer Networks and Information Technologies (pp. 498-503). Springer Berlin Heidelberg.
16 Ferraz, L. H. G. (2011). Um mecanismo de exclusao acurado e preciso baseado em confiança para controle de acesso em redes ad hoc (Doctoral dissertation, Universidade Federal do Rio de Janeiro).
17 Gadiparthi, M., Vejendla, M., Paladugu, R., & Rao, P. N. (2011). A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network. Wireless Communication, 3(2), 95-102.
18 Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE.
19 Aboud, S. J. (2009). Secure E-payment Protocol. International Journal of Computer Science and Security, 3(3).
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
14 PdfSR 
1 1. David B. Johnson, David A. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)", IETF Mobile Ad Hoc Networks Working Group, Internet Draft, 15 April 2003.
2 2. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L Viennot, "Optimized Link State Routing Protocol for Ad Hoc Networks", In Proceeding of IEEE Int'l MulU Topic Con!. 2001, IEEE Press, pp. 62-68, 2001.
3 3. Nikola Milanovic, Miroslaw Malek, Anthony Davidson and Veljko Milutinovic, "Routing and Security in Mobile Ad Hoc Networks", IEEE Computer. Vol. 37, No.2, pp. 61-65, February 2004.
4 L. Zhou, and Z. J. Haas, "Securing Ad Hoc Networks", IEEE Network Journals, Vol. 13, No.6, pp. 24-30, 1999.
5 5. A.Weimerskirch, and D. Westhoff, "Identity Certified Authentication for Ad Hoc Networks", 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 33-40, October 31, 2003.
6 6. menezes, P. V. Oorschot, and S. A. Vanstone, “handbook of Applied Cryptography”, CRC Press, New York, 1997
7 7. B. Newman and T. Tso. , “Kerberos: An Authentication Service for Computer Networks”, vol. 32, no. 9, pp. 33-38, Sept. 1994
8 8. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks", In Proceeding of the IEEE 9th International Conference on Network Protocols (ICNP'01), IEEE Computer Society, pp. 251, 2001.
9 9. H. Deng, A. MukheIjee, and D.P. Agrawal, "Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks", In Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE Computer Society, Vol. 1, No.1, pp. 107-111, January 2004.
10 10. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Adhoc Networks”, In Proceeding of IEEE Int’l Conf. Network Protocols, Nov. 2001
11 11. M. Narasimha, G. Tsudik, and J.H. Yi, “On the Unitility of Distributed Cryptography in P2P and Manets: The Case of Membership Control”, In Proceeding of IEEE Int’l Conf. Network Protocols Nov. 2003
12 12. S. Yi and R. Kravets, “Moca: Mobile Certificate Authority Wireless Ad Hoc Networks”, In Proceeding of Second Ann. PKI Research Workshop (PKI ’03), Apr. 2003
13 12. S. Yi and R. Kravets, “Moca: Mobile Certificate Authority Wireless Ad Hoc Networks”, In Proceeding of Second Ann. PKI Research Workshop (PKI ’03), Apr. 2003
14 13. M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, “A Cluster-Based Security Architecture for Ad Hoc Networks”, In Proceeding IEEE INFOCOM, Mar. 2004
15 14. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks”, IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004
16 15. Shamir, "Identity-based cryptosystems and signature schemes", in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer, pp. 47-53, Springer-Verlag, 1984.
17 16. M. Bohio, and A. Miri, "An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network", In Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR '04), IEEE Computer Society, pp. 6974, May 19-21, 2004.
18 17. A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad Hoc Networks", 2003 Symposium on Applications and the Internet Workshop (SAINT 2003), IEEE Computer Society, pp. 342-346, 2003.
19 18. H. Deng, A. Mukherjee, and D. Agrawal, “Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks”, In Proceeding Int’l Conf. Information Technology: Coding and Computing (ITCC ’04), Apr. 2004
20 19. N. Saxena, G. Tsudik, and J.H. Yi, “ Identity-Based Access Control for Ad Hoc Groups”, In Proceeding of International Conference of Information Security and Cryptology, Dec. 2004
21 20. Y. Zhang, W. Liu, W. Lou, Y. Fang, and Y. Kwon, “AC-PKI Anonymous and Certificateless Public-Key Infrastructure for Mobile Ad Hoc Networks”, In Proceeding of IEEE Int’l Conf. Comm pp. 3515-3519, May 2005
22 21. A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979
23 22. Y. Desmedt and Y. Frankel, “Threshold Cryptosystems”, In Proceeding of CRYPTO ’89, pp. 307-315, Aug. 1989.
24 23. R. L. Rivest, A. Shamir, and L. Adelman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Comm. Of ACM Vol.21, no.2, pp. 122-126, 1978.
Professor Anil Kumar Kapil
MMICT&BM, mullana - India
Mr. Sanjeev Kumar Rana
M M Engg college - India