Fully Self-Organized Key Agreement for Ad-Hoc Wireless Networks

被引:0
|
作者
Sieka, Bartlomiej [1 ]
Kshemkalyani, Ajay D. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60680 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a self-organizing bootstrapping protocol for establishing authenticated channels as well as secure identifiers in peer-to-peer networks. Specifically, the paper makes the following contributions. (1) It proposes a fully self-organized protocol that establishes an authenticated communication channel between nodes of a wireless ad-hoc network. This authenticated channel can then be used to establish a secret communication channel between nodes. This is the main contribution. (2) The protocol design also provides a secure identifier framework that is resilient to impersonation. The authentic identifiers it establishes can be used to associate network (and upper) layer identifiers to prevent spoofing. They can also serve as a reliable basis for reputation management protocols. The self-organized bootstrapping is a useful feature for designing autonomic systems.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [1] Self-Organized Monitoring in Ad-Hoc Networks
    Remi Badonnel
    Radu State
    Olivier Festor
    [J]. Telecommunication Systems, 2005, 30 : 143 - 160
  • [2] Self-organized monitoring in ad-hoc networks
    Badonnel, R
    State, R
    Festor, O
    [J]. TELECOMMUNICATION SYSTEMS, 2005, 30 (1-3) : 143 - 160
  • [3] Self-Organized Authentication in Mobile Ad-Hoc Networks
    Caballero-Gil, Pino
    Hernandez-Goya, Candelaria
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (05) : 509 - 517
  • [4] Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks
    Hernandez-Goya, Candelaria
    Caballero-Gil, Pino
    Fuster-Sabater, Amparo
    [J]. SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 103 - +
  • [5] Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    Molina-Gil, J.
    Hernandez-Goya, C.
    [J]. 2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 208 - +
  • [6] A self-organized authentication architecture in mobile ad-hoc networks
    Hahm, S
    Jung, Y
    Yi, S
    Song, Y
    Chong, E
    Lim, K
    [J]. INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 689 - 696
  • [7] Physical connectivity of self-organized ad hoc wireless networks
    Dousse, O
    Thiran, P
    [J]. IEEE INTELLIGENT SYSTEMS, 2003, 18 (04): : 83 - 86
  • [8] Scalability and security of self-organized wireless ad hoc networks
    Zhang, Chi
    Fang, Yuguang
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2884 - 2890
  • [9] Key agreement protocol in ad-hoc networks
    Lang, WH
    Zhou, MT
    She, K
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 296 - 301
  • [10] Modeling secure connectivity of self-organized wireless ad hoc networks
    Zhang, Chi
    Song, Yang
    Fang, Yuguang
    [J]. 27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 825 - 833