A scalable location service for geographic ad hoc routing
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. Therefore, it needs authentication against the mobile nodes. To make that possible, we have two methods: single Certificate Authority(CA) and distributed CA. In the case of single CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little safer than previous one because it needs attacks toward a lot of CAs to collapse the network. We can consider secret sharing scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method, and show the results of simulation.