Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Optimal-resilience proactive public-key cryptosystems
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Coding and Information Theory
Hi-index | 0.00 |
Unlike fixed networks, mobile ad-hoc networks have diverse characteristics, such as dynamic topologies, bandwidth-constrained links, energy-constrained operation, limited physical security, etc. Due to these characteristics their security requirements are different from those of fixed networks. This paper presents a method of authenticating the nodes in the ad-hoc network and securely transmitting information in consideration of the characteristics of the mobile ad hoc network. To this end, this paper proposes a method of combining asymmetric and symmetric cryptography to enhance the efficiency of secret key management for authentication and secure channel establishment. In particular, this paper proposes a method that introduces the concept of Hamming Distance to share the secret keys between the nodes. According to this proposal, secure communication between the nodes is possible when one node manages only log2Nsecret keys.