DocumentCode :
589720
Title :
Transmission-efficient group-key generation in large dynamic MANET environments
Author :
Dey, Hemanta ; Datta, Rohit
Author_Institution :
Electr. & Electron. Commun. Dept., Indian Institue of Technol., Kharagpur, India
fYear :
2012
fDate :
Nov. 30 2012-Dec. 1 2012
Firstpage :
355
Lastpage :
360
Abstract :
Cryptographic key-management in a large dynamic environment such as mobile ad hoc network is a challenging task due to the limited availability of communication resources in wireless domain. This paper describes a novel key-management system using cluster-based group multicasting technique. The method employs Identity-based threshold-cryptographic group-key share distribution among participating nodes to form a secure group. There exist several clusters in each group to generate combined group key share using aggregate signcryption. The clusters inside same group collaborate with each other to generate a combined group-secret-share at cluster level and then contact with other clusters for mutual exchange of the combined group-secret-share to produce the final group key. This approach reduces the number of required encrypted transmitted messages containing group key shares. The scheme is highly applicable to other distributed dynamic environments with high security demand.
Keywords :
cryptography; mobile ad hoc networks; telecommunication network management; telecommunication security; aggregate signcryption; cluster level; cluster-based group multicasting technique; combined group-secret-share; communication resources; cryptographic key-management; distributed dynamic environments; encrypted transmitted messages; group key share; identity-based threshold-cryptographic group-key share distribution; large dynamic MANET environments; mobile ad hoc network; mutual exchange; secure group; transmission-efficient group-key generation; wireless domain; Clustering algorithms; Communication system security; Cryptography; Mobile ad hoc networks; Peer to peer computing; Receivers; Wireless communication; MANET; adhoc network; key management; security; sensor network; share aggregation; threhold cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4673-1828-0
Type :
conf
DOI :
10.1109/EAIT.2012.6407965
Filename :
6407965
Link To Document :
بازگشت