Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

15.05.2019

MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks

verfasst von: Y. Harold Robinson, E. Golden Julie

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A mobile ad hoc network (MANET) is a collection of self-configured movable nodes. Keys have to be securely handled and maintained and there are various techniques available in MANET for efficient key generation and distribution. Trying to keep the keys always protected during transmission is a difficult issue. A multipart trust based public key management (MTPKM) is intended to gather a requisite stage of security, in addition to convene better output necessities like service accessibility and message overhead exclusive of communication on known certificate authority. An optimal trust threshold is associated with all the nodes to reduce security vulnerabilities like the public key compromise and key leakage. MTPKM does not support trusted the third party hence it finds the most trusted neighbor node which satisfies the trust threshold condition to certifying the key generated. In turn, the neighbor node again ensures the confidence of the node which is requesting to certify the public key. The requesting node and certificate issuer node must exhibit a mutual trust relationship. The proposed trust-based scheme is simulated and the performance is evaluated. It is observed that the proposed scheme surpasses other trust-based models in terms of availability and security vulnerability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Luo, H., & Lu, S. (2004). URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12, 1049–1063.CrossRef Luo, H., & Lu, S. (2004). URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12, 1049–1063.CrossRef
5.
Zurück zum Zitat Capkun, S., Buttyan, L., & Pierre, J. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transaction on Mobile Computing, 2, 1233–1536.CrossRef Capkun, S., Buttyan, L., & Pierre, J. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transaction on Mobile Computing, 2, 1233–1536.CrossRef
6.
Zurück zum Zitat Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. In MobiHoc (pp. 299–302). Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. In MobiHoc (pp. 299–302).
7.
Zurück zum Zitat Kapil, A., & Rana, S. (2008). Identity-based key management in MANETs using public key cryptography. International Journal of Security, 3, 1–6. Kapil, A., & Rana, S. (2008). Identity-based key management in MANETs using public key cryptography. International Journal of Security, 3, 1–6.
8.
Zurück zum Zitat Xoing, W., & Gong, Y. H. (2011). Secure and highly efficient three level key management scheme for MANET. WSEAS Transactions on Computers, 10(10), 6–15. Xoing, W., & Gong, Y. H. (2011). Secure and highly efficient three level key management scheme for MANET. WSEAS Transactions on Computers, 10(10), 6–15.
9.
Zurück zum Zitat Van der Merwe, J., Dawoud, D., & McDonald, S. (2004). Trustworthy key management for mobile ad hoc networks. In Proceedings southern African telecommunication networks and applications conference (SATNAC). Van der Merwe, J., Dawoud, D., & McDonald, S. (2004). Trustworthy key management for mobile ad hoc networks. In Proceedings southern African telecommunication networks and applications conference (SATNAC).
10.
Zurück zum Zitat Sahadevaiah, K., & Ramanaiah, O. B. V. (2008). Self-organized public-key cryptography for mobile ad hoc networks. IEICE Transactions on Communications, E91–B(11), 3574–3583. Sahadevaiah, K., & Ramanaiah, O. B. V. (2008). Self-organized public-key cryptography for mobile ad hoc networks. IEICE Transactions on Communications, E91–B(11), 3574–3583.
11.
Zurück zum Zitat Tamboli, A. S., Shinde, S. S., & Tamboli, S. S. (2011). Simulation of self-organized public-key management for ad hoc networks. IJCA Special Issue on Network Security and Cryptography (NSC). Tamboli, A. S., Shinde, S. S., & Tamboli, S. S. (2011). Simulation of self-organized public-key management for ad hoc networks. IJCA Special Issue on Network Security and Cryptography (NSC).
12.
Zurück zum Zitat Maity, S., & Hansdah, R. C. (2014). Self-organized public key management in MANETs with enhanced security and without certificate-chains. Computer Networks, 65, 183–211.CrossRef Maity, S., & Hansdah, R. C. (2014). Self-organized public key management in MANETs with enhanced security and without certificate-chains. Computer Networks, 65, 183–211.CrossRef
13.
Zurück zum Zitat Lehane, B., & Doyle, L. (2006). Shared RSA key generation in a mobile ad hoc network. IEEE Transactions on Mobile Computing, 5, 43–51.CrossRef Lehane, B., & Doyle, L. (2006). Shared RSA key generation in a mobile ad hoc network. IEEE Transactions on Mobile Computing, 5, 43–51.CrossRef
14.
Zurück zum Zitat John, S. P., & Samuel, P. (2015). Self-organized key management with trusted certificate exchange in MANET. Ain Shams Engineering Journal, 6(1), 161–170.CrossRef John, S. P., & Samuel, P. (2015). Self-organized key management with trusted certificate exchange in MANET. Ain Shams Engineering Journal, 6(1), 161–170.CrossRef
15.
Zurück zum Zitat Chauhan, K. K., & Tapaswe, S. (2010). A secure key management system in group structured mobile ad hoc networks. In IEEE international conference on wireless communications, networking and information security (pp. 307–311). Chauhan, K. K., & Tapaswe, S. (2010). A secure key management system in group structured mobile ad hoc networks. In IEEE international conference on wireless communications, networking and information security (pp. 307–311).
16.
Zurück zum Zitat Huang, H., & Wu, S.F. (2003). An approach to certificate path discovery in mobile ad hoc networks. In 1st ACM workshop on security of ad hoc and sensor networks. Huang, H., & Wu, S.F. (2003). An approach to certificate path discovery in mobile ad hoc networks. In 1st ACM workshop on security of ad hoc and sensor networks.
17.
Zurück zum Zitat Huang, J., & Nicol, D. (2009). A calculus of trust and its application to PKI and identity management. In ACM 8th symposium on identity and trust on the internet. Huang, J., & Nicol, D. (2009). A calculus of trust and its application to PKI and identity management. In ACM 8th symposium on identity and trust on the internet.
18.
Zurück zum Zitat Meng, X., & Li, Y. (2012). Verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network. In IEEE international conference on automation and logistics (Vol. 2, pp. 673–689). Meng, X., & Li, Y. (2012). Verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network. In IEEE international conference on automation and logistics (Vol. 2, pp. 673–689).
19.
Zurück zum Zitat Shamir, A. (2007). Threshold cryptography based on sharing of secrets. In ACM symposium on identity and trust on the internet (pp. 612–613). Shamir, A. (2007). Threshold cryptography based on sharing of secrets. In ACM symposium on identity and trust on the internet (pp. 612–613).
20.
Zurück zum Zitat Zhang, Y., Liu, W., Fang, Y., & Kwon, Y. (2005). AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks. In: IEEE international conference on communications (ICC’05) (Vol. 25, pp. 3515–3519). Zhang, Y., Liu, W., Fang, Y., & Kwon, Y. (2005). AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks. In: IEEE international conference on communications (ICC’05) (Vol. 25, pp. 3515–3519).
21.
Zurück zum Zitat Al-Riyami, S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (Vol. 2894, pp. 452–473). Al-Riyami, S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (Vol. 2894, pp. 452–473).
23.
Zurück zum Zitat Rana, S., & Kapil, A. (2001). Identity-based and threshold key management in mobile ad hoc networks. In Proceeding of ACM symposium on MANET (pp. 146–155). Rana, S., & Kapil, A. (2001). Identity-based and threshold key management in mobile ad hoc networks. In Proceeding of ACM symposium on MANET (pp. 146–155).
24.
Zurück zum Zitat Sun, H., Zheng, X., & Deng, Z. (2009). An identity-based and threshold key management scheme for ad hoc networks. In International conference on networks security and wireless communications and trusted computing (pp. 520–523). Sun, H., Zheng, X., & Deng, Z. (2009). An identity-based and threshold key management scheme for ad hoc networks. In International conference on networks security and wireless communications and trusted computing (pp. 520–523).
25.
Zurück zum Zitat Dahshan, H., Elsayed, F., Rohiem, A., Elmoghazy, A., & Irvin, J. (2008). A trust based threshold revocation scheme for MANET. IEEE MASS, 2008, 130–137. Dahshan, H., Elsayed, F., Rohiem, A., Elmoghazy, A., & Irvin, J. (2008). A trust based threshold revocation scheme for MANET. IEEE MASS, 2008, 130–137.
26.
Zurück zum Zitat Cho, J. H., Swami, A., & Chen, I. R. (2010). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRef Cho, J. H., Swami, A., & Chen, I. R. (2010). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRef
27.
Zurück zum Zitat Harold Robinson, Y. & Golden Julie, E. (2019). SMR: A synchronized multipath rebroadcasting mechanism for improving the quality of conversational video service. Wireless Personal Communications, 104(3), 1149–1173.CrossRef Harold Robinson, Y. & Golden Julie, E. (2019). SMR: A synchronized multipath rebroadcasting mechanism for improving the quality of conversational video service. Wireless Personal Communications, 104(3), 1149–1173.CrossRef
28.
Zurück zum Zitat Dahshan, H., & Irvine, J. (2009). Key management in web of trust for mobile ad hoc networks. In International conference on advanced information networking and applications (Vol. 13, pp. 24–30). Dahshan, H., & Irvine, J. (2009). Key management in web of trust for mobile ad hoc networks. In International conference on advanced information networking and applications (Vol. 13, pp. 24–30).
29.
Zurück zum Zitat Chang, M. J., Cho, J.‐H., Chen, I.‐R., Chan, K. S., & Swami, A. (2012). Trust‐based task assignment in military tactical networks. In 17th international command & control research & technology symposium (ICCRTS). Chang, M. J., Cho, J.‐H., Chen, I.‐R., Chan, K. S., & Swami, A. (2012). Trust‐based task assignment in military tactical networks. In 17th international command & control research & technology symposium (ICCRTS).
Metadaten
Titel
MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks
verfasst von
Y. Harold Robinson
E. Golden Julie
Publikationsdatum
15.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06588-4

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt