How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Communications of the ACM
Asynchronous verifiable secret sharing and proactive cryptosystems
Proceedings of the 9th ACM conference on Computer and communications security
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Some Recent Research Aspects of Threshold Cryptography
ISW '97 Proceedings of the First International Workshop on Information Security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Verifiable Secret Redistribution for Archive Systems
SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
Secure and Efficient Key Management in Mobile Ad Hoc Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
APSS: proactive secret sharing in asynchronous systems
ACM Transactions on Information and System Security (TISSEC)
An Extended Verifiable Secret Redistribution Protocol for Archival Systems
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Mobile proactive secret sharing
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Heuristic algorithms for minimum bandwith consumption multicast routing in wireless mesh networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Securing wireless mesh networks
IEEE Wireless Communications
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Hi-index | 0.00 |
Wireless mesh networks (WMNs) should provide authentication and key management without a trusted third party because of their self-organizing and self-configuring characteristics. Several solutions to this problem have been proposed in mobile ad hoc networks (MANETs). But they are not optimal for WMNs because WMNs are with stationary mesh routers (MRs) that do not suffer from the limited power problem. In this paper, we design an architecture of mesh certification authority (MeCA) for WMNs. In MeCA, the secret key and functions of certification authority (CA) are distributed over several MRs. For secret sharing and redistribution, we develop the fast verifiable share redistribution (FVSR) scheme, which works for threshold cryptography and minimizes the possibility of secret disclosure when some shareholders are compromised by adversaries. MeCA adopts the multicasting based on Ruiz tree, which is optimal in reducing the operation overhead. It can update, revoke, and verify certificates of WMN nodes in a secure and efficient manner. Simulation results show that MeCA does not disclose its secret key even under severe attacks while incurring low overhead compared to other existing schemes in MANETs.