Cryptographic techniques for mobile ad-hoc networks

被引:15
|
作者
Daza, Vanesa [1 ]
Herranz, Javier [2 ]
Morillo, Paz [3 ]
Rafols, Carla
机构
[1] Univ Rovira & Virgili, Dept Engn Informat & Math, E-43007 Tarragona, Spain
[2] CSIC, Artificial Intelligence Res Inst, Spanish Natl Res Council Campus, E-08193 Barcelona, Spain
[3] Univ Politecn Cataluna, Dept Matemat Aplicada, E-08034 Barcelona, Spain
关键词
mobile ad-hoc networks; secret sharing techniques; identity-based cryptography; threshold cryptography;
D O I
10.1016/j.comnet.2007.08.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose some cryptographic techniques to securely set tip a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:4938 / 4950
页数:13
相关论文
共 50 条
  • [1] Keynote: Efficient cryptographic techniques for mobile ad-hoc networks
    Zheng, Yuliang
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 117 - 117
  • [2] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    [J]. ELECTRONICS, 2021, 10 (04)
  • [3] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [4] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
  • [5] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    [J]. INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [6] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [7] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287
  • [8] Actors for mobile ad-hoc networks
    Dedecker, J
    Van Belle, W
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 482 - 494
  • [9] QoS in Mobile Ad-Hoc Networks
    Pushp Sra
    Satish Chand
    [J]. Wireless Personal Communications, 2019, 105 : 1599 - 1616
  • [10] QoS in Mobile Ad-Hoc Networks
    Sra, Pushp
    Chand, Satish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1599 - 1616