Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Ad Hoc Networking
Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
A robust certification service for highly dynamic MANET in emergency tasks
International Journal of Communication Systems - Secure communications and data management in ubiquitous services
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-trivial security requirements. As the basis of security services, key management is essential for securing communication systems. In this paper, we address issues critical to key management in MANET. A Self-initialized Distributed Certificate Authority (SDCA) model which combines the advantages of two existing schemes, the Distributed Certificate Authority (DCA) scheme and Certificate Chain (CC) scheme, is proposed. In the proposed model, no trusted dealer or the pre-established trust relationships is required. Instead, entities in the MANET could collaborate to initialize the key management service on the fly. The simulation results illustrate that the proposed model will bring less communication, storage and computational overheads for maintaining and using the key management service than other self-organized key management schemes.