The official PGP user's guide
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Self organization in mobile ad hoc networks: the approach of Terminodes
IEEE Communications Magazine
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks
IEEE Transactions on Mobile Computing
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Simulating the establishment of trust infrastructures in multi-agent systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Secure and Efficient Key Management in Mobile Ad Hoc Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Autonomous trust construction in multi-agent systems: a graph theory methodology
Advances in Engineering Software
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Discrete Applied Mathematics
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)
Proceedings of the 43rd annual Southeast regional conference - Volume 2
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
An Autonomous Trust Construction System Based on Bayesian Method
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Service-based P2P overlay network for collaborative problem solving
Decision Support Systems
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
Tree-based group key agreement framework for mobile ad-hoc networks
Future Generation Computer Systems
Optimal Dispersal of Certificate Chains
IEEE Transactions on Parallel and Distributed Systems
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
SecLEACH-On the security of clustered sensor networks
Signal Processing
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
Sahnet: a secure system for ad-hoc networking using ecc
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Cryptographic techniques for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure content access and replication in pure P2P networks
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
International Journal of Mobile Network Design and Innovation
Key management in ad hoc networks using self-certified public key system
International Journal of Mobile Communications
Role management in adhoc networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
Information Security and Cryptology
Using New Tools for Certificate Repositories Generation in MANETs
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
A new scalable distributed authentication for P2P network and its performance evaluation
WSEAS Transactions on Computers
A new scalable distributed authentication for P2P network and its performance evaluation
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Efficient public key authentication in MANET
Proceedings of the International Conference on Advances in Computing, Communication and Control
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Dynamic trust establishment in emergency ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A scalable distributed security infrastructure for industrial control and sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
PKIX Certificate Status in Hybrid MANETs
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
An adaptive and safe ubicomp for HPC applications
International Journal of Ad Hoc and Ubiquitous Computing
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
A framework for seamless service interworking in ad-hoc networks
Computer Communications
IEEE Transactions on Information Forensics and Security
A proposal for secure vehicular communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
IEEE Transactions on Wireless Communications
Self-healing key management service for mobile ad hoc networks
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Discrete Applied Mathematics
Key agreement for heterogeneous mobile ad-hoc groups
International Journal of Wireless and Mobile Computing
A smart card based distributed identity management infrastructure for mobile ad hoc networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Certificate status validation in mobile ad hoc networks
IEEE Wireless Communications
A global authentication scheme for mobile ad-hoc networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A novel adaptive and safe framework for ubicomp
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
A key management scheme combined with intrusion detection for mobile ad hoc networks
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Recent developments and experimental guidelines in mobile ad-hoc networks
International Journal of Wireless and Mobile Computing
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Approximability and inapproximability of the minimum certificate dispersal problem
Theoretical Computer Science
A group-based key management protocol for mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
K-Tree: A multiple tree video multicast protocol for Ad hoc wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A self-organized mechanism for thwarting malicious access in ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A formal study of trust-based routing in wireless ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A distributed sinkhole detection method using cluster analysis
Expert Systems with Applications: An International Journal
Dynamic, non-interactive key management for the bundle protocol
Proceedings of the 5th ACM workshop on Challenged networks
A gradual solution to detect selfish nodes in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Routing for disruption tolerant networks: taxonomy and design
Wireless Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
A spontaneous ad hoc network to share WWW access
EURASIP Journal on Wireless Communications and Networking
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Efficient public key certificate management for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
Optimal node placement in distributed wireless security architectures
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Introducing secure and self-organized vehicular ad-hoc networks
Proceedings of the 12th International Conference on Computer Systems and Technologies
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
SOMA: self-organised mesh authentication
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
On the price of security in large-scale wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
Twitter in disaster mode: security architecture
Proceedings of the Special Workshop on Internet and Disasters
A secure global state routing for mobile ad hoc networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
The application of collaborative filtering for trust management in p2p communities
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Cluster-Based certificate chain for mobile ad hoc networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Self-protection in p2p networks: choosing the right neighbourhood
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
A new scheme for key management in ad hoc networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
A composite key management scheme for mobile ad hoc networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Applying mobile agent to intrusion response for ad hoc networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
Towards a theory of self-organization
OPODIS'05 Proceedings of the 9th international conference on Principles of Distributed Systems
Collaborative trust-based shortest secure path discovery in mobile ad hoc networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
International Journal of Network Management
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
Minimum certificate dispersal with tree structures
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Personal and Ubiquitous Computing
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Composite trust-based public key management in mobile ad hoc networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Safeguarding ad hoc networks with a self-organized membership control system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Content-location based key management scheme for content centric networks
Proceedings of the 6th International Conference on Security of Information and Networks
Cross-layer metrics for reliable routing in wireless mesh networks
IEEE/ACM Transactions on Networking (TON)
How to build vehicular ad-hoc networks on smartphones
Journal of Systems Architecture: the EUROMICRO Journal
Mutual authentication in self-organized VANETs
Computer Standards & Interfaces
Hi-index | 0.01 |
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. In this paper, we propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.