Filters








238 Hits in 5.6 sec

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks [chapter]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2008 Lecture Notes in Computer Science  
In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes.  ...  Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing  ...  In this paper, we propose a novel key management approach using certificateless public key cryptography (CL-PKC) [10] .  ... 
doi:10.1007/978-3-540-88140-7_11 fatcat:jvpq6l22mbhj7p45jfiskzmche

A Novel Approach on Certificateless Encryption Schemes

R. Rajesh, S. Gavaskar, A. Sumithra
2016 International Journal of Computer Applications  
The modern field of cryptography is divided into two main areas based on the basic encryption mechanism as symmetric key cryptography and Public-key cryptography.  ...  But in Public-Key method, two different but mathematically related keys are useda public key and a private key. So comparatively the second method is more popular.  ...  Fagen Li et al [26] , has proposed a scheme titled key management using certificateless public key cryptography in ad hoc networks.  ... 
doi:10.5120/ijca2016911347 fatcat:wuk6ip5jefclbfk6vdf3nvlcya

A Pairing-free Certificateless Authenticated Group Key Agreement for Mobile Ad Hoc Network

Jun ZHENG, Jian-Dong YIN, Jin-Rong XUE, Yun-Long WANG
2017 DEStech Transactions on Computer Science and Engineering  
The mobile Ad Hoc network is widely used in fields without communication infrastructure.  ...  To meet the demand for highly secure and efficient group communication in Ad Hoc network, many contributory group key agreement protocols have been proposed.  ...  Introduction Group key agreement is an effective method to secure group communication in mobile Ad Hoc network.  ... 
doi:10.12783/dtcse/aice-ncs2016/5686 fatcat:ullwjqm5cvaqldxed3hjrpl2li

Mobile ad-hoc network key management with certificateless cryptography

Zhenfei Zhang, Willy Susilo, Raad Raad
2008 2008 2nd International Conference on Signal Processing and Communication Systems  
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before.  ...  Abstract In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before.  ...  Mobile Ad Hoc Network MANET Overview Mobile Ad-hoc Network (MANET) is one of the most widely discussed and researched areas in the field of wireless communications.  ... 
doi:10.1109/icspcs.2008.4813743 fatcat:74fkufzpsbddbknnrtgzq7jvo4

Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network

Jamel Miri, Bechir Nsiri, Ridha Bouallegue
2017 International Journal of Wireless & Mobile Networks  
Finally, we prove, after a deep examination of multiple Public Key Cryptography (PKC) schemes, that the certificateless one is the most suitable for Ad-Hoc UWB-IR networks characterized by nodes mobility  ...  in order to secure data and communications in Ad-Hoc UWB-IR Networks.  ...  PUBLIC KEY CRYPTOGRAPHY SCHEME FOR AD-HOC UWB-IR NETWORK Asymmetric Key Cryptography or Public Key Cryptography (PKC) scheme came to solve the problem of key management in Symmetric Key Cryptography (SKC  ... 
doi:10.5121/ijwmn.2017.9604 fatcat:2teoqm3iq5cmbb4wnhclyb73n4

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks

Kuo Zhao, Longhe Huang, Hongtu Li, Fangming Wu, Jianfeng Chu, Liang Hu
2013 Journal of Communications  
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention.  ...  Public Key Certificates (PKCs). [6] As a powerful alternative to certificate-based PKI, identity-based cryptography (IBC) [7], [8] allows public keys to be derived from entities' known identity information  ...  the constraints of ad-hoc networks.  ... 
doi:10.12720/jcm.8.11.768-779 fatcat:frkaotni2bfi7lcldt27oun2a4

Review of MANETS Using Distributed Public-key Cryptography [article]

Ms. Rajni, Ms. Reena
2014 arXiv   pre-print
Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment  ...  The study of secure distributed key agreement has great theoretical and practical significance.  ...  "Identity-Based Key Management in MANETs using Public Key Cryptography."  ... 
arXiv:1405.0100v1 fatcat:3hs7cub5cbcethxs4kaukzcmyq

Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography

Shohreh Honarbakhsh, Liza Binti Abdul Latif, Azizah bt Abdul Manaf, Babak Emami
2014 International Journal of Computer and Communication Engineering  
This paper studies key management and security issues in mobile ad hoc networks (MANETs).  ...  It is a certificateless solution which eliminates the need for public key distribution and certificates in public key management schemes.  ...  In Asymmetric Key Cryptography there are two types of keys; Public Key, and Private Key. Public Key is used for encrypting, and Private Key is used for decrypting.  ... 
doi:10.7763/ijcce.2014.v3.289 fatcat:lx5x2lwp25a4jpux3i37wy4gqe

A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems

Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu
2008 2008 The 28th International Conference on Distributed Computing Systems Workshops  
Many CPS applications will be implemented on computing devices using mobile ad hoc networks (MANETs).  ...  In order to solve some problems in these schemes, such as the costly and complex key management problem in traditional public key cryptography and the "key escrow" problem in identity-based cryptography  ...  Networks that support mobile wireless ad hoc architecture are typically called mobile ad hoc networks (MANETs).  ... 
doi:10.1109/icdcs.workshops.2008.84 dblp:conf/icdcsw/XuLZHDS08 fatcat:syeksgwz65hlpg2ina3to6julm

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

Sumithra Alagarsamy, S. P. Rajagopalan
2017 International Journal of Computer Applications  
rate compared to the state-of-the-art works. between secret and public key accordingly, if the secret and public keys are similar, the signature is valid or else the signature is invalid.  ...  The mobile network consists of 500 nodes in the network structure and uses the Random Way Point (RWM) model.  ...  In [15] , the various approaches were used in cryptography for Network security purpose but the key management and optimal cryptography algorithm was remained unaddressed.  ... 
doi:10.5120/ijca2017915705 fatcat:4eqe6i6c7jcknas6d3wpimcvpa

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication

Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong
2016 International Journal of Network Security  
Certificateless cryptography is introduced for eliminating the use of certificates in Public Key Infrastructure and solving the key-escrow problem in ID-based cryptogratography.  ...  Recently, Qin et al. proposed the first RSA-based certificateless ring signature scheme which was proved unforgeable in random oracle model.  ...  Certificateless ring signature schemes can provide anonymous authentication for ad hoc networks.  ... 
dblp:journals/ijnsec/XuHTZ16 fatcat:lxvutwyk2rg3loihv676vqkueq

Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim, M. Irfan Uddin
2020 Complexity  
Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet  ...  The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation.  ...  Certificateless key management schemes are key management approaches that use certificateless public key cryptography (CLPKC) [22] , while for imposing limitations and constraints on the key generation  ... 
doi:10.1155/2020/6619498 fatcat:vecyrbypdjcjtca5x7bumoqbvi

Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks

Pino Caballero-Gil, Francisco Martín-Fernández, Cándido Caballero-Gil
2014 Journal of Computer and Communications  
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks.  ...  When using identity-based cryptography to achieve certificateless authentication, membership revocation is not a trivial problem.  ...  Vehicular Ad-hoc NETworks (VANETs) are self-organizing networks built up from moving vehicles that communicate with each other mainly to prevent adverse circumstances on the roads, but also to achieve  ... 
doi:10.4236/jcc.2014.29003 fatcat:ywogib6avfhntaocyjqvcfmpmi

CPAAS: an efficient conditional privacy-preservation anonymous authentication scheme using signcryption in VANET

Meenakshi Gupta, Poonam Gera, Bharavi Mishra
2021 International Journal of Vehicle Information and Communication Systems  
Vehicular Ad-Hoc Network (VANET) is a tremendously promising innovation in the field of Intelligent Transportation System (ITS).  ...  We have used distributed pseudo_id for preserving the privacy of vehicle and the ID-based Certificateless Signcryption scheme based on elliptic curve cryptography to provide an effective way to achieve  ...  Introduction Vehicular Ad-Hoc Networks (VANETs) is an embryonic innovation that integrates ad-hoc networks and wireless LAN (WLAN), for enhancing road security and driving conditions through inter-vehicle  ... 
doi:10.1504/ijvics.2021.113485 fatcat:yv72cucotfcwpikmw2xhno52dq

An Optimal Lightweight Cryptographic Approach for WSN and its Energy Consumption Analysis

Shailendra Gaur, Amar Mohapatra, Brijesh Kochar
2018 International Journal of Intelligent Engineering and Systems  
Therefore, we are focusing on evaluation and optimization of power consumption in wireless sensor networks using light weight cryptographic techniques.  ...  This research paper studies the certificateless cryptographic algorithms and hence develops an optimal algorithm for the same.  ...  Cryptography and security in WSN and other ad-hoc network has been increased.  ... 
doi:10.22266/ijies2018.0630.07 fatcat:2bxcczai4re3jie7sjt4fkcjj4
« Previous Showing results 1 — 15 out of 238 results