A practical approach of ID-based cryptosystem in ad hoc networks

Cited 2 time in webofscience Cited 5 time in scopus
  • Hit : 413
  • Download : 115
As research in ad hoc networking has advanced, the importance of security increases more and more. But it suffers from the restriction that ad hoc networks do not have the established infrastructure. In this paper we propose a security-enhanced model with ID-based cryptosystem which removes the necessity for any infrastructure and provides sound authentication. Also we provide a more secure and concrete routing protocol with aggregate signature. For confidentiality, we also provide a key exchange protocol. And our model not only distributes the role of key generation center in ID-based cryptosystem to the nodes with threshold cryptography, but also increases availability by providing a secret re-sharing protocol. Therefore, our model is very appropriate for ad hoc networks. Copyright (c) 2007 John Wiley & Sons, Ltd.
Publisher
JOHN WILEY & SONS INC
Issue Date
2007-09
Language
English
Article Type
Article
Citation

WIRELESS COMMUNICATIONS & MOBILE COMPUTING, v.7, pp.909 - 917

ISSN
1530-8669
DOI
10.1002/wcm.500
URI
http://hdl.handle.net/10203/10525
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 2 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0