Abstract

Providing secure communications in mobile ad hoc networks (MANET) is an important and difficult problem, due to a lack of a key management infrastructure. The authentica tion is an important security service in (MANETs). To provide a node authentication service we use a fully distributed certificate authorities (FDCA) based on the threshold cryptography. In this paper we propose an efficient and verifiable multi secret sharing scheme in cluster-based MANET with a low computation system. Our scheme is based on the overdetermined linear system equation in Galois fields GF(2 r ). We have analyzed our scheme based on security and performance criteria, and compared with existing approaches. The efficiency of our proposed schemes was verified and evaluated by simula tion. Simulation results show that this approach is scalable.

Highlights

  • The dynamic aspect of the ad hoc network and lack of central controlling authority and infrastructure make this network vulnerable to some attack [1]

  • In 2012 Hu et al [21] proposed two verifiable multi secret sharing schemes (VMSS); the first uses Lagrange polynomial for distributing and reconstructing the secret and LFSR based on public key cryptosystem to check the validity of the data

  • We note that the parameter k has an influence on the CDF, where t = 1 this means that the certificate authority (CA) node needs only their private key to sign the certificate of issuer node

Read more

Summary

INTRODUCTION

The dynamic aspect of the ad hoc network and lack of central controlling authority and infrastructure make this network vulnerable to some attack [1]. Authentication system is necessary to prevent a behavior of a malicious node. The cryptography is further classified into two categories symmetric key cryptography and asymmetric key cryptography, and it is one of the techniques used to provide communication in ad hoc networks. The symmetric key cryptography uses one shared key and requires less computation and energy against the second type that uses two keys one private and the other is public. For efficient management of certificates systems we need a public key infrastructure (PKI) [2]. The certificate authority (CA) is the most important unit in PKI

A PKI can be grouped with the kind of CA employed
Reconstruction step
Verifiability
EVALUATION
Results
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call