DOI QR코드

DOI QR Code

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han (Kyungpook National Univ. School of Electrical Engineering and Computer Science) ;
  • Park, Young-Ho (Kyungpook National Univ. School of Electronic Engineering) ;
  • Moon, Sang-Jae (Kyungpook National Univ. School of Electrical Engineering)
  • Received : 2011.05.25
  • Accepted : 2011.06.23
  • Published : 2011.06.30

Abstract

Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

Keywords

Acknowledgement

Supported by : Korea Research Foundation

References

  1. E. D. Silva, A. L. D. Santos, and L. C. P. Albini, "Identity-based key management in mobile ad hoc networks: techniques and applications," IEEE Wireless Communications, vol. 15, pp. 46-52, Oct. 2008.
  2. Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Transactions on Dependable and Secure Computing, vol. 3, pp. 386-399, 2006. https://doi.org/10.1109/TDSC.2006.58
  3. A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPT084, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
  4. D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," CRYPTO01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
  5. L. C. Li, and R. S. Liu, "Securing cluster-based ad Hoc networks with distributed authorities," IEEE Transactions on Wireless Communications, vol. 9, pp. 3072-3081, 2010. https://doi.org/10.1109/TWC.2010.080610.090759
  6. P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," CRYPTO 02, LNCS 2442, pp. 354-368, Springer-Verlag, 2002.
  7. Z. Zhu, Y. Zhang and F. Wang, "An efficient and provable secure identity based ring signcryption scheme," Computer Standards & Interfaces 31, pp. 1092-1097, 2009. https://doi.org/10.1016/j.csi.2008.09.023
  8. H. Y. Chien, "ID-based key agreement with anonymity for ad hoc networks," EUC 2007, LNCS 4808, pp. 333-345, Springer- Verlag, 2007.
  9. I. G. Han, K. W. Rim, and J. H. Lee, "The directional partial dominant pruning algorithm for efficient message forwarding in an wireless ad-hoc network," Journal of the Korea Industrial Information System Society, vol. 14, no. 2, pp. 1-22, June, 2006.
  10. Y. H. Park, "Vehicle registration protocol for secure communication in VANET environment," Journal of the Korea Industrial Information System Society, vol. 15, no. 4, pp. 1-5, Dec. 2010.