Gasmi, KenzaBourouis, AbdelhabibBenaboud, Rohallah2024-03-112024-03-112021-05-25978-9931-9788-0-0http://dspace.univ-oeb.dz:4000/handle/123456789/18703Mobile Ad hoc networks attract more attention over the years, but the security matter of this type of network makes it hard to achieve all of their advantages. Cryptographic key management is the cornerstone for building any robust network security solution. Identity-based cryptography is a promising solution that resists well the key escrow problem which is suitable for Mobile Ad hoc networks. In this paper, we give an overview of the most important identity-based encryption schemes proposed in the last decade; combined with other techniques to enhance it and provide better results for Mobile Ad hoc networks. Hence, we give a comparative analysis to highlight their advantages and weaknesses. This work gives insights into a recent research to point out its interesting features, take advantages of its strength, ovoid its weaknesses and to lay out the future directions in this area.enManet; key management; identity-based; cryptography; threshold cryptographyA Survey on Identity-based Key Management Schemes in Mobile Ad hoc networksArticle