Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Layer 7 Multimedia Proxy Handoff Using Anycast/Multicast in Mobile Networks
IEEE Transactions on Mobile Computing
International Journal of Wireless and Mobile Computing
IEEE Transactions on Multimedia
Proxy caching for media streaming over the Internet
IEEE Communications Magazine
Hi-index | 0.00 |
The use of proxies is commonplace in today's MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required. In this paper, we will address the research issues of when and how end-to-end security, like confidentiality and authenticity can be preserved, in mobile ad hoc network communications, when having one or more cache proxies and router nodes in the data path. We propose a solution for an encryption scheme based on Asymmetric Cipher Sequence which allows to an intermediary nodes to cache data and convert the ciphertext for one person into the ciphertext for another person without revealing the secret decryption keys or the plaintext. Implementation results shows that we can simultaneously achieve high encryption through a wireless links.