Against mobile attacks in Mobile Ad-hoc Networks
Many recent security schemes for ad-hoc networks use identity-based cryptography and threshold cryptography. These schemes are subject to mobile attacks. The existing solution is secret refreshing. We notice some loopholes in this solution, and propose an improved scheme to address them. By dividing...
Saved in:
Published in | 2010 IEEE International Conference on Information Theory and Information Security pp. 499 - 502 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2010
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Many recent security schemes for ad-hoc networks use identity-based cryptography and threshold cryptography. These schemes are subject to mobile attacks. The existing solution is secret refreshing. We notice some loopholes in this solution, and propose an improved scheme to address them. By dividing the master key of identity-based cryptography into static part and dynamic part, the scheme is more resistant to mobile attacks and some others, such as Sybil attacks. While remaining the key escrow free feature, the scheme can dramatically reduce secret refreshing overhead. Threshold cryptosystems using this scheme are thus more survivable and scalable. |
---|---|
ISBN: | 1424469422 9781424469420 |
DOI: | 10.1109/ICITIS.2010.5689553 |