Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks

被引:0
|
作者
Zhou, HB [1 ]
Mutka, MW [1 ]
Ni, LM [1 ]
机构
[1] Slippery Rock Univ, Dept Comp Sci, Slippery Rock, PA 16057 USA
关键词
distributed certificate authority; MANET; security; Sybil attack;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most prevalent Distributed Certificate Authority (DCA) schemes in the MANET are based upon threshold cryptography, which is invulnerable to mobile adversaries and tolerable to missing or faulty DCA server nodes, and thus becomes the "de facto" standard for the security framework in the MANET. However, this scheme cannot defeat Sybil attacks, in which a malicious node impersonates many identities. To solve the problem, a multiple-key cryptography-based DCA scheme, namely the MC-DCA scheme, is proposed in the paper. It is invulnerable to Sybil attacks, and achieves lower communication overhead and moderate latency compared with the threshold-based scheme, which is supported by the simulation results.
引用
收藏
页码:1681 / 1685
页数:5
相关论文
共 50 条
  • [41] A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
    Dey, Haimabati
    Datta, Raja
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 400 - 409
  • [42] Secure routing with time-space cryptography for mobile ad-hoc networks
    Joe, Inwhee
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1869 - 1874
  • [43] Dynamic support for distributed certification authority in mobile ad hoc networks
    Raghani, Sanjay
    Toshniwal, Durga
    Joshi, Ramesh
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 424 - +
  • [44] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
  • [45] Distributed symmetric key management for mobile ad hoc networks
    Chan, ACF
    [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
  • [46] Tree-based group key agreement framework for mobile ad-hoc networks
    Liao, Lijun
    Manulis, Mark
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2007, 23 (06): : 787 - 803
  • [47] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    [J]. INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [48] Tree-based group key agreement framework for mobile ad-hoc networks
    Liao, Lijun
    Manulis, Mark
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 5 - +
  • [49] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [50] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287