
Security bootstrapping of mobile ad hoc networks using identity‐based cryptography
Author(s) -
Adli Mehr Kamal,
Musevi Niya Javad
Publication year - 2016
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1423
Subject(s) - computer science , mobile ad hoc network , computer network , computer security , wireless ad hoc network , bootstrapping (finance) , key management , verifiable secret sharing , shared secret , scalability , cryptography , identity (music) , vehicular ad hoc network , key distribution , secret sharing , set (abstract data type) , wireless , public key cryptography , encryption , telecommunications , physics , database , network packet , acoustics , financial economics , economics , programming language
Widespread utilization of mobile ad hoc networks, which communicate via broadcast wireless channels without any sort of infrastructure, raises security concerns. Introduction of identity‐based cryptography shed some light to security problems of mobile ad hoc networks. Key management (KM) plays significant role in network security. Although many proposals are suggested for identity‐based KM, they usually assume a trusted set of nodes during network initialization, which is not the case in many real‐world applications. In this paper, a novel identity‐based KM method is proposed, which utilizes Pedersen's verifiable secret sharing method. By distributing shared secret and key generation role among network nodes, the proposed method provides high levels of availability and scalability, while eliminating single point of failure. The proposed method provides a mechanism to check the validity of secret shares, which are generated by network nodes. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared with the performance of the existing methods. Copyright © 2016 John Wiley & Sons, Ltd.