Publication | Closed Access
An authenticated broadcasting scheme for wireless ad hoc network
34
Citations
11
References
2004
Year
Unknown Venue
Broadcast SchemeEngineeringAuthenticated Broadcasting SchemeBroadcast KeysInformation SecurityAd Hoc NetworkSecure RoutingAuthenticationData PrivacyAd Hoc NetworksComputer ScienceWireless ComputingKey ManagementSecure ProtocolAuthentication ProtocolData SecurityCryptography
We propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme that suggested an identity-based cryptosystem for ad hoc networks. Due to the dynamic nature of ad hoc networks, we allow nodes to generate their own broadcast keys for different groups in the network, and change those when associated groups are changed. However, we ensure through our signcryption scheme that broadcast keys are implicitly controlled by the trusted authority (TA), and can be used for as long as the private keys are issued. Our keys are based on identities and do not use certificates. We also propose a non-probabilistic method for computing unique broadcast keys for different groups. We use identity-based pairwise symmetric keys as the building block for our broadcast scheme. Such keys are computed non-interactively by the nodes, which reduces communication overhead and simplifies key management in pairwise communication.
| Year | Citations | |
|---|---|---|
2003 | 3.5K | |
2001 | 2.5K | |
1999 | 2.3K | |
2003 | 1.4K | |
2005 | 1K | |
2003 | 823 | |
2000 | 746 | |
2016 | 203 | |
1989 | 191 | |
1994 | 182 |
Page 1
Page 1