Abstract :
Current solutions either do not consider the main requisites of these networks, as the absence of central administration or self organization, or do not detail with important operations, such as key revocation or key update. Thus, this paper presents (Identity-Based Cryptography), a complete and fully self-organized identity-based key management scheme for mobile ad hoc networks. Does not depend on any central authority or third trusted party, even during the network formation. Also, provides mechanisms to revoke the private key of malicious or compromised nodes and ways to update the keys of non-compromised nodes. Simulation results show that is effective while it does not impose a high communication overhead to the system.