Ad Hoc Networks Security Mechanism Based on CPK

  • Authors:
  • Lei Feng-Yu;Cui Guo-Hua;Liao Xiao-Ding

  • Affiliations:
  • -;-;-

  • Venue:
  • CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The existing security schemes are not applicable to ad hoc networks perfectly because ad hoc networks have some inherent security vulnerabilities and stringent resource constraints. This paper suggests using CPK as the security mechanisms of ad hoc networks with the purpose of high-level security as well as excellent performance. This paper investigates several security schemes, and evaluates the scalability, the availability and the robustness of the schemes by extensive simulations. The simulation results show the advantages of CPK contrasting with PKI, peer-to-peer authentication scheme, and the localized scheme.