To search, Click below search items.


All Published Papers Search Service


Design a secure composite key-management scheme in Ad-Hoc Networks using Localization


Seyed-Mohsen Ghoreishi, Morteza Analoui


Vol. 9  No. 9  pp. 35-49


A mobile Ad-Hoc network is a collection of wireless mobile nodes, dynamically forming a temporary network without the use of any existing network infrastructure or centralized Administra-tion. Providing security support for mobile Ad-Hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and also this fact that wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering and also mobile users demand “anywhere, anytime” services. In this paper, we present a new Composite Key Management scheme in Ad-Hoc networks. our approach works to decrease complexity of PKI in traditional public-key certificated-based systems and securely improves key-revocation and key-renewal approaches in ID-based systems. in this approach third trusted party (TTP), in which gives offline secret shared-key to each user, securely generates users private key( like PKG in ID-based systems) and also can play the role of directory service in Certificated-Authority like traditional certificated-based public key systems. More precisely if one user wants to obtain certificated public-key of another user, he can ask from TTP and get his desirable public-key.


PKG, TTP, key-management, Identity-based, certificated-based