Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Distributed Authentication for Peer-to-Peer Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Personal Servers as Digital Keys
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 09
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Identification in Ad Hoc Networks
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09
Spontaneous networks: Trust in a world of equals
ICNS '06 Proceedings of the International conference on Networking and Services
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A secure routing protocol for ad hoc networks based on trust
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Spontaneous networking: an application oriented approach to ad hoc networking
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
A spontaneous ad hoc network to share WWW access
EURASIP Journal on Wireless Communications and Networking
Hi-index | 0.00 |
We can find many cases where a spontaneous wireless ad-hoc network must be built for a limited period of time in a wireless mesh network: meetings, conferences, etc. One of the main aspects in a spontaneous network is to provide security mechanisms to the users. Confidentially, integrity, authentication, availability and no-repudiation should be provided for all the users in the network and the information should travel ciphered through the network. This paper shows two secure spontaneous wireless ad-hoc network protocols for wireless mesh clients that are based on the computational costs: the weak and the strong one. They are based on the trust of the users and guarantee a secure protocol between the users and the mesh routers. Both protocols provide node authenticity, intermediate node authenticity, integrity checking, random checking, verification distribution and erroneous packets elimination (before they arrive to the destination). The protocol procedure, its messages and development are explained in detail. Finally, we will compare their energy consumption with other secure protocols. The comparison will prove their benefits.