Picture of person typing on laptop with programming code visible on the laptop screen

World class computing and information science research at Strathclyde...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by University of Strathclyde researchers, including by researchers from the Department of Computer & Information Sciences involved in mathematically structured programming, similarity and metric search, computer security, software systems, combinatronics and digital health.

The Department also includes the iSchool Research Group, which performs leading research into socio-technical phenomena and topics such as information retrieval and information seeking behaviour.


An elliptic curve secret sharing key management scheme for mobile ad hoc networks

Dahshan, Hisham M.K. and Irvine, J. (2011) An elliptic curve secret sharing key management scheme for mobile ad hoc networks. Security and Communication Networks, 4 (12). 1405–1419. ISSN 1939-0114

Full text not available in this repository. Request a copy from the Strathclyde author


In mobile ad hoc networks (MANETs), traditional security solutions are not adequate due to the infrastructureless nature and the absence of centralized administration. In this paper, a threshold key management scheme for MANETs is presented. The proposed scheme is implemented using elliptic curve dlog-based cryptosystem. In this scheme, an off-line central authority (CA) is required in the initialization phase before network deployment. The CA creates and preloads the shares matrix for each mobile node in the network initialization phase. Each session member generates its private/public key pair, and the session public key by collaborating with its trusted neighbors. The generation of the node private/public key pair, and the session public key is performed without any prior communication between session members. The advantages of the proposed scheme are justified through extensive timing and network simulations.