Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Identity certified authentication for ad-hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
Secure and Efficient Key Management in Mobile Ad Hoc Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Handbook of Algorithms for Wireless Networking and Mobile Computing (Chapman & Hall/Crc Computer & Information Science)
Group Key Management in Wireless Networks Using Session Keys
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
On Compromising Password-Based Authentication over HTTPS
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Encryption: Security Considerations for Portable Media Devices
IEEE Security and Privacy
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
A hybrid cryptosystem based on WEP for 802.11 networks
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks
Node Level Security Management and Authentication in Mobile Ad Hoc Networks
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
A symmetric key based secured data gathering protocol for WSN
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
In a wireless network, open and wireless communication channels set the restriction of wired connections free, because wireless signal acts as the platform of data transmission. On the other hand, the open and shared nature of wireless networks also causes a number of security concerns. In particular, data confidentiality is one of the most important issues. As usual, cryptosystems are adopted to protect the data confidentiality and integrity, including symmetric and asymmetric encryption algorithms. However, due to the limitations of these algorithms, how to apply them to wireless and mobile networks is always a debatable topic. In this paper, we explore the issue of applying both symmetric and asymmetric key algorithms for data encryption and authentication. Then we propose an advisable solution for the application of these cryptographic algorithms, which not only takes advantage of symmetric key to provide the effective protection of data transmission, but also employs asymmetric key to authenticate a node reliably. We formalize the security analysis and show that our system owns effective and provable secure attributes based on rational combination of classic encryption algorithms. Thus, we avoid the weakness of these two cryptosystems and make use of their advantages to establish a secure environment, by the combination of symmetric and asymmetric key algorithms.