The broadcast storm problem in a mobile ad hoc network
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Robust threshold DSS signatures
Information and Computation
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Securing Authentication and Privacy in Ad hoc Partitioned Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
The handbook of ad hoc wireless networks
The handbook of ad hoc wireless networks
EURASIP Journal on Wireless Communications and Networking
A Probabilistic Certificate Updating Protocol for MANET
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
On-demand public-key management for mobile ad hoc networks: Research Articles
Wireless Communications & Mobile Computing - Wireless Network Security
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
Computer Communications
Optimal Dispersal of Certificate Chains
IEEE Transactions on Parallel and Distributed Systems
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable routing in delay tolerant networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
IEEE Network: The Magazine of Global Internetworking
Authenticity check to provide trusted platform in MANET (ACTP)
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.00 |
Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on network members. The main contribution of this paper is an efficient public key management scheme that is suitable for fully self-organized mobile ad hoc networks where all nodes play identical roles. Our approach implies that the operations of creating, storing, distributing, and revoking nodes' public keys are carried out locally by the nodes themselves. The goal of the presented methods is the improvement in the process of building local certificate repositories of nodes. In order to do it, an authentication solution based on the web of trust concept is combined with an element of routing based on the multipoint relay concept introduced in the optimized link state routing protocol. Our proposal leads to a good tradeoff among security, overhead, and flexibility. Experimental results show a considerable decrease in resource consumption while carrying out the certificate verification process.