Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges

  • Authors:
  • Marianne A. Azer;Sherif M. El-Kassas;Magdy S. El-Soudani

  • Affiliations:
  • National Telecommunication Institute, Egypt;American University in Cairo, Egypt/ Member IEEE;Cairo University, Egypt/ Senior member IEEE

  • Venue:
  • ICSNC '07 Proceedings of the Second International Conference on Systems and Networks Communications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches, there are threshold cryptography and authentication. In this paper we survey the threshold cryptography based schemes and the authentication schemes that have been proposed to secure ad hoc networks. We conclude this paper and identify the challenges and open research areas associated with each of these approaches.