SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
Pura Mihai-Lică, Patriciu Victor Valeriu, Bica Ion
2009
Abstract
Ad hoc networks are a promising technology especially from the point of view of its aim: assuring connectivity. But communication cannot be separated from security without loosing a lot of its benefits. That is why research has to focus on security aspects of the ad hoc network too. The paper presents an implementation of a security scheme for ad hoc networks based on identity-based cryptography. This implementation was made in ns2, using MIRACL library to implement identity-based encryption. The solution focuses only on assuring confidentiality, but can be further developed to assure also authentication, integrity and non-repudiation. For the start, an ns2 implementation was developed to provide a simulation environment where different possible scenarios can be tested and the scheme can be improved according to the results, before the real implementation.
References
- Boyen X., Martin L., 2007, Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems, Network Working Group, Request for Comments: 5091.
- Cooks Clifford, 2001, An Identity Based Encryption Scheme based on Quadratic Residues, UK Crown.
- Leiming Xu, 2001, How to Add a New Protocol in NS2.
- Oliveira L.B., Aranha D., Morais E., Daguano F., Lopez J., Dahab R., 2007, TinyTate: Identity-Based Encryption for Sensor Networks, University of Campinas
- Ros F.J., Ruiz P.M., 2004, Implement a New Manet Unicast Routing Protocol in NS2.
- Shamir Adi, 1998, Identity Based Cryptosystems and Signature Schemes, Springer-Verlang.
Paper Citation
in Harvard Style
Mihai-Lică P., Victor Valeriu P. and Ion B. (2009). SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 135-139. DOI: 10.5220/0002183701350139
in Bibtex Style
@conference{secrypt09,
author={Pura Mihai-Lică and Patriciu Victor Valeriu and Bica Ion},
title={SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={135-139},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002183701350139},
isbn={978-989-674-005-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
SN - 978-989-674-005-4
AU - Mihai-Lică P.
AU - Victor Valeriu P.
AU - Ion B.
PY - 2009
SP - 135
EP - 139
DO - 10.5220/0002183701350139