Introduction to algorithms
Generating binary trees using rotations
Journal of the ACM (JACM)
Pairing heaps: experiments and analysis
Communications of the ACM
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Policy-directed certificate retrieval
Software—Practice & Experience
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Relying Party Credentials Framework
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Efficient Certificate Revocation
Efficient Certificate Revocation
Security in sensor networks: watermarking techniques
Wireless sensor networks
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
On eliminating packet droppers in MANET: A modular solution
Ad Hoc Networks
A Lightweight Delegated Privileges Revocation Scheme Based on Coding
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Composite trust-based public key management in mobile ad hoc networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
Public key certificates prove validity and authenticity of their ownership and possibly other properties. Certificate path discovery is the critical process for public key verification in hierarchical public key infrastructure (PKI) diagrams. This process is conventionally done in centralized public key management system such as central CA or directory. However, in an infrastructure-less environment, such as a mobile ad hoc network, no such central service is present due to network dynamics. That brings the challenges for public key verification. Some researchers have been exploring public key management in ad hoc networks, but none of their studies are based on the hierarchical public key trust model. In this paper, we present a scheme to represent each CA certificate with a coded certificate path label and design an algorithm to speed up the process of certificate path discovery without the presence of central PKI service. Furthermore, we propose an on-demand protocol to collect the certificates in networks on the fly. In the final we present the performance evaluation for the implementation of our proposed ideas in ns-2.