A Survey on Identity-based Key Management Schemes in Mobile Ad hoc networks

dc.contributor.authorGasmi, Kenza
dc.contributor.authorBourouis, Abdelhabib
dc.contributor.authorBenaboud, Rohallah
dc.date.accessioned2024-03-11T18:46:44Z
dc.date.available2024-03-11T18:46:44Z
dc.date.issued2021-05-25
dc.description.abstractMobile Ad hoc networks attract more attention over the years, but the security matter of this type of network makes it hard to achieve all of their advantages. Cryptographic key management is the cornerstone for building any robust network security solution. Identity-based cryptography is a promising solution that resists well the key escrow problem which is suitable for Mobile Ad hoc networks. In this paper, we give an overview of the most important identity-based encryption schemes proposed in the last decade; combined with other techniques to enhance it and provide better results for Mobile Ad hoc networks. Hence, we give a comparative analysis to highlight their advantages and weaknesses. This work gives insights into a recent research to point out its interesting features, take advantages of its strength, ovoid its weaknesses and to lay out the future directions in this area.
dc.identifier.isbn978-9931-9788-0-0
dc.identifier.urihttp://dspace.univ-oeb.dz:4000/handle/123456789/18703
dc.language.isoen
dc.publisherUniversity of Oum El Bouaghi
dc.subjectManet; key management; identity-based; cryptography; threshold cryptography
dc.titleA Survey on Identity-based Key Management Schemes in Mobile Ad hoc networks
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
A Survey on Identity-based Key Management Schemes in Mobile Ad hoc networks.pdf
Size:
202.28 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: