Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Multicast operation of the ad-hoc on-demand distance vector routing protocol
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Scalability study of the ad hoc on-demand distance vector routing protocol
International Journal of Network Management
Key Management for Heterogeneous Ad Hoc Wireless Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Securing ad-hoc networks is a challenging task owing to their specific characteristics. One of the major challenges is that ad-hoc networks typically lack a fixed infrastructure, both in the form of physical nodes such as routers, servers and stable communication links, and in the form of an organisational or administrative infrastructure. Thus new nodes can join and leave the network at any time, which appeals to an efficient and flexible trust establishment mechanism. We propose in this paper an efficient protocol for key management in ad-hoc networks relying on the routing mechanism itself, which reduces efficiently the overhead and provides better performances.