By Topic

Identity-based and secret share ECC key management scheme for MANET

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wan An Xiong ; School of Electronic Engineering, University of Electronic Science and Technology of China. UESTC, Cheng Du, China ; Ming Yu Fan ; Chun Xiang Xu

MANET consists of wireless mobile nodes that could be self-configured. These nodes aren't supported by any established infrastructure. So it is commonly susceptible to various attacks. The relevant researches for MANETs currently focus on solving various security problems. In this article, we first briefly survey previous works regarding key management of MANETs, and then simply introduce the security scheme presented by Yuchen Zhang, Jing Liu, etc. We further present our scheme based on the security scheme's insufficiency in respect of each node's identity authentication and secure channel for MANETs. In the end, We evaluate the performance of the above scheme in detail.

Published in:

New Trends in Information Science and Service Science (NISS), 2010 4th International Conference on

Date of Conference:

11-13 May 2010