Title :
Pseudo-identity based encryption and its application in mobile ad hoc networks
Author :
Veeraraghavan, Prakash
Author_Institution :
Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Abstract :
An ad hoc network is characterized by the absence of any central infrastructure. Since the network is formed in fly, nodes may either join or leave the network at their wish. Since there are no dedicated routers, routing function is accomplished through multiple peer-peer connections. Thus any malicious node may offer routing voluntarily in order to attract more traffic towards it. In order to establish confidentiality and integrity of data packets, it is essential to use some form of encryption. Public key algorithms may not be possible as there is no possibility of having a central PKI in an ad hoc network, and CPU/memory requirements. Symmetric key cryptography may be used; however, session key may not be distributed securely to remote nodes. In this paper, we provide an elegant solution to these two problems using our proposed algorithm called pseudo-identity based encryption.
Keywords :
cryptography; mobile ad hoc networks; telecommunication network routing; CPU-memory requirements; PKI; malicious node; mobile ad hoc networks; peer-peer connections; pseudo-identity based encryption; routing function; symmetric key cryptography; Encryption; Mobile ad hoc networks; Peer to peer computing; Polynomials; Public key; Ad hoc network; Pseudo-identity based encryption; Threshold cryptography;
Conference_Titel :
Communications (MICC), 2011 IEEE 10th Malaysia International Conference on
Conference_Location :
Kota Kinabalu, Sabah
Print_ISBN :
978-1-4577-0977-7
DOI :
10.1109/MICC.2011.6150298