Password authentication with insecure communication
Communications of the ACM
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we propose a secure key establishment protocol, called UGSP, for wireless ad-hoc networks using tamper proof hardware (TPH) UGSP results in creating a secure communication channel between two nodes without any third party involvement and hence is suitable for ad-hoc networks UGSP is robust to man-in-the-middle attack, passive eavesdropping, active impersonation attacks ensuring source authentication, data confidentiality and data integrity for communication The system is amenable to dynamic addition of new members A comparative evaluation of UGSP with other approaches along with issues of scalability and cost-effectiveness are discussed.