Browse > Article
http://dx.doi.org/10.9723/jksiis.2011.16.2.013

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks  

Park, Yo-Han (Kyungpook National Univ. School of Electrical Engineering and Computer Science)
Park, Young-Ho (Kyungpook National Univ. School of Electronic Engineering)
Moon, Sang-Jae (Kyungpook National Univ. School of Electrical Engineering)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.16, no.2, 2011 , pp. 13-18 More about this Journal
Abstract
Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.
Keywords
Ad hoc networks; Cluster; Key management; Scalability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Z. Zhu, Y. Zhang and F. Wang, "An efficient and provable secure identity based ring signcryption scheme," Computer Standards & Interfaces 31, pp. 1092-1097, 2009.   DOI   ScienceOn
2 H. Y. Chien, "ID-based key agreement with anonymity for ad hoc networks," EUC 2007, LNCS 4808, pp. 333-345, Springer- Verlag, 2007.
3 I. G. Han, K. W. Rim, and J. H. Lee, "The directional partial dominant pruning algorithm for efficient message forwarding in an wireless ad-hoc network," Journal of the Korea Industrial Information System Society, vol. 14, no. 2, pp. 1-22, June, 2006.
4 Y. H. Park, "Vehicle registration protocol for secure communication in VANET environment," Journal of the Korea Industrial Information System Society, vol. 15, no. 4, pp. 1-5, Dec. 2010.
5 E. D. Silva, A. L. D. Santos, and L. C. P. Albini, "Identity-based key management in mobile ad hoc networks: techniques and applications," IEEE Wireless Communications, vol. 15, pp. 46-52, Oct. 2008.
6 Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Transactions on Dependable and Secure Computing, vol. 3, pp. 386-399, 2006.   DOI
7 A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPT084, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
8 D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," CRYPTO01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
9 L. C. Li, and R. S. Liu, "Securing cluster-based ad Hoc networks with distributed authorities," IEEE Transactions on Wireless Communications, vol. 9, pp. 3072-3081, 2010.   DOI
10 P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," CRYPTO 02, LNCS 2442, pp. 354-368, Springer-Verlag, 2002.