IDENTITY BASED PUBLIC KEY EXCHANGE (IDPKE) FOR WIRELESS AD HOC NETWORKS

Clare McGrath, Ghazanfar Ali Safdar, Máire McLoone

Abstract

In this paper a novel identity based public key exchange (IDPKE) protocol is proposed for wireless ad hoc networks, where the network node IDs are used as public keys. Previous research into ID based key management schemes assumes that node IDs are well known and have been distributed amongst the nodes at the time of network formation. However, this assumption limits the application of these schemes to many ad hoc networking scenarios. Our proposed IDPKE protocol addresses this disadvantage. It assumes that node IDs are not known prior to network formation and provides secure and authentic ID exchange between nodes, thus allowing employment in a wider range of applications. The IDPKE protocol is an extension to an existing certificate based scheme and it provides an increase in security and a reduction in computation and bandwidth by comparison.

References

  1. Bertoni, G.M., Chen, L., Fragneto, P., Harrison, K.A., Pelosi, G., 2005. Computing Tate Pairing on Smartcards. Available at http://www.st.com/stonline/ product/families/smartcard/ches2005_v4.pdf.
  2. Boneh, D., Franklin, M., 2001. Identity-based Encryption from the Weil Pairing, SIAM J. of Computing Vol.32, No.3, pp.586-615, 2003. Extended Abstract in Proceedings of Crypto 2001, vol.2139 of Lecture Notes in Computer Science, pages 213-229, SpringerVerlag, 2001.
  3. Capkun, S., Hubaux, J.-P., Buttyan, L., 2003.
  4. Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol.2, no.1, 2003, pp.52-64.
  5. Deng, H., Mukherjee, A., Agrawal, D.P., 2004.
  6. Hoeper, K., Gong, G., 2004. Models of Authentications in Ad Hoc Networks and Their Related Network Properties, CACR technical report.
  7. Hoeper, K., Gong, G., 2006. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Revocation,Waterloo Tech. Report.
  8. Khalili, A., Katz, J., Arbaugh, W., 2003. Toward Secure Key Distribution in Truly Ad Hoc Networks, 2003 Symposium on Applications & the Internet Workshops (SAINT'03), IEEE Comp. Soc.
  9. Li, X., Gordon, S., Slay, J., 2004. On Demand Public Key Management for Wireless Ad Hoc Networks, Proc of the Australian Telecommunication Networks & Applications Conference, Australia, Dec 2004.
  10. McGrath, C., Safdar, G., .McLoone, M., 2006. Novel Authenticated Key Management Framework for Ad Hoc Network Security,IEE Irish Signals and Systems Conference, Dublin, June 28-30, 2006.
  11. Zhou, L., Haas, Z., 1999. Securing Ad Hoc Networks, IEEE Network Journal, vol.13, no.6, 1999, pp.24-30.
Download


Paper Citation


in Harvard Style

McGrath C., Ali Safdar G. and McLoone M. (2007). IDENTITY BASED PUBLIC KEY EXCHANGE (IDPKE) FOR WIRELESS AD HOC NETWORKS . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 167-170. DOI: 10.5220/0002123101670170


in Bibtex Style

@conference{secrypt07,
author={Clare McGrath and Ghazanfar Ali Safdar and Máire McLoone},
title={IDENTITY BASED PUBLIC KEY EXCHANGE (IDPKE) FOR WIRELESS AD HOC NETWORKS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={167-170},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002123101670170},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - IDENTITY BASED PUBLIC KEY EXCHANGE (IDPKE) FOR WIRELESS AD HOC NETWORKS
SN - 978-989-8111-12-8
AU - McGrath C.
AU - Ali Safdar G.
AU - McLoone M.
PY - 2007
SP - 167
EP - 170
DO - 10.5220/0002123101670170