2012
DOI: 10.1109/surv.2011.020211.00045
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks

Abstract: This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007. To introduce the topic, we first review most important developments on general Identity-Based Cryptography. The survey introduces briefly the technology of Identity-Based Cryptography, summarizes different approaches of applying it to secure mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0
6

Year Published

2013
2013
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 90 publications
(45 citation statements)
references
References 83 publications
0
35
0
6
Order By: Relevance
“…Owing to the openness of the wireless network and uncontrollability of the nodes without a Central Authority (CA), the availability of compromising nodes and unauthorized access becomes inevitable in the network. Many researchers have worked on this issue and proposed various schemes that can be broadly classified as hard and soft security schemes [29,30]. In the hard security scheme, cryptographic algorithms are implemented to ensure confidentiality on information exchange and authentication of participation nodes.…”
Section: Benchmarking Of Recommendation Trust Computation For Trust/tmentioning
confidence: 99%
“…Owing to the openness of the wireless network and uncontrollability of the nodes without a Central Authority (CA), the availability of compromising nodes and unauthorized access becomes inevitable in the network. Many researchers have worked on this issue and proposed various schemes that can be broadly classified as hard and soft security schemes [29,30]. In the hard security scheme, cryptographic algorithms are implemented to ensure confidentiality on information exchange and authentication of participation nodes.…”
Section: Benchmarking Of Recommendation Trust Computation For Trust/tmentioning
confidence: 99%
“…Other solutions focus on utilizing more key pairs, using threshold, and considering expired date for the master key. However, they have some drawbacks that make them unsuitable for Ad-Hoc networks such as too much overhead to the network, more computation /communication for nodes which are resource constrained devices [12].…”
Section: Identity-based Cryptosystems (Ibc)mentioning
confidence: 99%
“…Although there are a lot of works about generic WSNs and mobile ad hoc networks (MANETs) security (e.g., [14]- [16]), these mechanisms are not directly applicable in MSNs due to the unique and challenging operational and security requirements of MSNs. For instance, the authors of [14] introduce a novel approach to ensure distributed privacy-preserving access control, which is built on a ring signature technique.…”
Section: Related Workmentioning
confidence: 99%