Public-key management in mobile ad hoc networks

被引:0
作者
Lin, Haifeng [1 ]
Jiang, Anna [1 ]
Bai, Di
Liu, Yunfei [1 ]
机构
[1] Nanjing Forestry Univ, Sch Informat Sci & Technol, Nanjing, Jiangsu, Peoples R China
来源
PIAGENG 2013: INTELLIGENT INFORMATION, CONTROL, AND COMMUNICATION TECHNOLOGY FOR AGRICULTURAL ENGINEERING | 2013年 / 8762卷
关键词
Wireless Networks; Public Key; Wireless Security; Mobile Ad Hoc Networks;
D O I
10.1117/12.2020161
中图分类号
S2 [农业工程];
学科分类号
0828 ;
摘要
A mobile ad hoc network is a new type of wireless networking paradigm which, in general, consists of solely mobile hosts and dispenses with infrastructure. One main challenge in design of mobile ad hoc networks is the vulnerability to security attacks. Without physical boundaries, a mobile ad hoc network faces many more security threats than a wired network does. Therefore the security of mobile ad hoc networks is one of the major research interests in wireless communications. In contrast with conventional networks, public key management protocols of mobile ad hoc networks do not based on infrastructures, where we can use trusted third parties or centralized servers for key management. This is because that the topology of mobile ad hoc networks is unknown due to link and node failures and to node mobility. For these factors, traditional key management solutions which require on-line trusted authorities or certificate authorities are not suitable for securing mobile ad hoc networks. In this report, we first review some existed public-key management protocols for mobile ad hoc networks and after that we propose a fully distributed public -key management model which does not need the third trusted authority.
引用
收藏
页数:9
相关论文
共 15 条
[1]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[2]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75
[3]  
DESMEDT YG, 1994, EUR T TELECOMMUN, V5, P449
[4]  
Frankel Y, 1997, LECT NOTES COMPUT SC, V1294, P440
[5]   Optimal-resilience proactive public-key cryptosystems [J].
Frankel, Y ;
Gemmell, P ;
MacKenzie, PD ;
Yung, MT .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :384-393
[6]  
Lu S., 2001, P 9 INT C NETW PROT
[7]  
Matt B., 2001, 7 ANN ACM INT C MOB
[8]  
Molva R., 2002, RES REPORT
[9]  
Ostrovsky R., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P51, DOI 10.1145/112600.112605
[10]  
Perkins C., 2000, AD HOC NETWORKING