The official PGP user's guide
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
IEEE Network: The Magazine of Global Internetworking
The state of peer-to-peer simulators and simulations
ACM SIGCOMM Computer Communication Review
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Role management in adhoc networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Dynamic trust establishment in emergency ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Hi-index | 0.00 |
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs is more challenging than in conventional networks due to the lack of central authority. The main contribution of this paper is a low complexity key management scheme that is suitable for fully self-organized MANETs. The proposed peer-to-peer key management scheme uses subordinate public keys and crypto-based identifiers to eliminate any form of trusted third party. Nodes can create, disseminate and revocate their own keying material with low communication and computational overhead. We show how localized certificate exchanges on the network layer can be used to break the routing-security interdependence cycle without degrading the performance of the network. Our proposed solution is also generic since it can be deployed in any "open" mobile wireless network with symmetric or asymmetric encryption.