Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Complexity estimates depending on condition and round-off error
Journal of the ACM (JACM)
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Fast dictionary attacks on passwords using time-space tradeoff
Proceedings of the 12th ACM conference on Computer and communications security
Tree-based group key agreement framework for mobile ad-hoc networks
Future Generation Computer Systems
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
Cross-layer optimization for wireless systems: a european research key challenge
IEEE Communications Magazine
Key agreement in ad hoc networks
Computer Communications
Hi-index | 0.00 |
Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.