Multicluster, mobile, multimedia radio network
Wireless Networks
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Designing Secure Wireless Mobile Ad Hoc Networks
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Localized Protocols for Ad Hoc Clustering and Backbone Formation: A Performance Comparison
IEEE Transactions on Parallel and Distributed Systems
Security for cluster based ad hoc networks
Computer Communications
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
Security and Cooperation in clustered mobile ad hoc networks with centralized supervision
IEEE Journal on Selected Areas in Communications
An ID-based cryptosystem based on the discrete logarithm problem
IEEE Journal on Selected Areas in Communications
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
A Cluster-Based Framework for the Security of Medical Sensor Environments
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Information Sciences: an International Journal
A Secure Ambulance Communication Protocol for VANET
Wireless Personal Communications: An International Journal
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications
An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Ad hoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network share the responsibility for routing, access, and communications. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes communicating with each other. Such networks are more vulnerable to security threats than traditional wireless networks because of the absence of the fixed infrastructure. For providing secure communications in such networks, lots of mechanisms have been proposed since the early 1990s, which also have to deal with the limitations of the mobile ad hoc networks, including high power saving and low bandwidth. Besides, public key infrastructure (PKI) is a well-known method for providing confidential communications in mobile ad hoc networks. In 2004, Varadharajan et al. proposed a secure communication scheme for cluster-based ad hoc networks based on PKI. Since the computation overheads of the PKI cryptosystem are heavy for each involved communicating node in the cluster, we propose an ID-based version for providing secure communications in ad hoc networks. Without adopting PKI cryptosystems, computation overheads of involved nodes in our scheme can be reduced by 25% at least.