SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS

Pura Mihai-Lică, Patriciu Victor Valeriu, Bica Ion

2009

Abstract

Ad hoc networks are a promising technology especially from the point of view of its aim: assuring connectivity. But communication cannot be separated from security without loosing a lot of its benefits. That is why research has to focus on security aspects of the ad hoc network too. The paper presents an implementation of a security scheme for ad hoc networks based on identity-based cryptography. This implementation was made in ns2, using MIRACL library to implement identity-based encryption. The solution focuses only on assuring confidentiality, but can be further developed to assure also authentication, integrity and non-repudiation. For the start, an ns2 implementation was developed to provide a simulation environment where different possible scenarios can be tested and the scheme can be improved according to the results, before the real implementation.

References

  1. Boyen X., Martin L., 2007, Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems, Network Working Group, Request for Comments: 5091.
  2. Cooks Clifford, 2001, An Identity Based Encryption Scheme based on Quadratic Residues, UK Crown.
  3. Leiming Xu, 2001, How to Add a New Protocol in NS2.
  4. Oliveira L.B., Aranha D., Morais E., Daguano F., Lopez J., Dahab R., 2007, TinyTate: Identity-Based Encryption for Sensor Networks, University of Campinas
  5. Ros F.J., Ruiz P.M., 2004, Implement a New Manet Unicast Routing Protocol in NS2.
  6. Shamir Adi, 1998, Identity Based Cryptosystems and Signature Schemes, Springer-Verlang.
Download


Paper Citation


in Harvard Style

Mihai-Lică P., Victor Valeriu P. and Ion B. (2009). SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 135-139. DOI: 10.5220/0002183701350139


in Bibtex Style

@conference{secrypt09,
author={Pura Mihai-Lică and Patriciu Victor Valeriu and Bica Ion},
title={SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={135-139},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002183701350139},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
SN - 978-989-674-005-4
AU - Mihai-Lică P.
AU - Victor Valeriu P.
AU - Ion B.
PY - 2009
SP - 135
EP - 139
DO - 10.5220/0002183701350139