Revue de l'Information Scientifique et Technique
Volume 26, Numéro 1, Pages 1-11
2021-12-20
Authors : Gasmi Kenza . Bourouis Abdelhabib . Benaboud Rohallah .
Mobile Ad hoc networks attract more attention over the years, but the security matter of this type of network makes it hard to achieve all of their advantages. Cryptographic key management is the cornerstone for building any robust network security solution. Identity-based cryptography is a promising solution that resists well the key escrow problem, which is suitable for Mobile Ad hoc networks. In this paper, we give an overview of the most important identity-based encryption schemes proposed in the last decade; combined with other techniques to enhance it and provide better results for Mobile Ad hoc networks. Hence, we give a comparative analysis to highlight their advantages and weaknesses. This work gives insights into a recent research to point out its interesting features, take advantages of its strength, ovoid its weaknesses and to lay out the future directions in this area.
MANET, key management, identity-based, cryptography, Threshold Cryptography
Djebbar Asma Insaf
.
Ghalem Belalem
.
pages 96-101.
Djenouri Djamel
.
pages 141-160.
Bounouni Mahdi
.
Bouallouche-medjkoune Louiza
.
Choulak Elhadi
.
Chiker Mehdi
.
pages 11-19.
Benkhelifa Imane
.
Chakib Lamini
.
Azouz Hichem
.
Moussaoui Samira
.
pages 9-15.