Cryptographic techniques for mobile ad-hoc networks

被引:15
|
作者
Daza, Vanesa [1 ]
Herranz, Javier [2 ]
Morillo, Paz [3 ]
Rafols, Carla
机构
[1] Univ Rovira & Virgili, Dept Engn Informat & Math, E-43007 Tarragona, Spain
[2] CSIC, Artificial Intelligence Res Inst, Spanish Natl Res Council Campus, E-08193 Barcelona, Spain
[3] Univ Politecn Cataluna, Dept Matemat Aplicada, E-08034 Barcelona, Spain
关键词
mobile ad-hoc networks; secret sharing techniques; identity-based cryptography; threshold cryptography;
D O I
10.1016/j.comnet.2007.08.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose some cryptographic techniques to securely set tip a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:4938 / 4950
页数:13
相关论文
共 50 条
  • [21] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [22] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    [J]. 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [23] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    [J]. NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [24] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [25] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    [J]. Cluster Computing, 2005, 8 : 111 - 118
  • [26] Interference Criteria for Mobile Ad-Hoc Networks
    Boksiner, Jeffrey
    Posherstnik, Yuriy
    Yeager, Richard O.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1427 - 1432
  • [27] An Optimization Strategy for Mobile Ad-hoc Networks
    Luo, Jianlu
    Yang, Juan
    Cheng, Fang
    Fu, Dandan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 921 - 925
  • [28] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [29] Routing protocols in mobile Ad-hoc networks
    Gilaberte, RL
    Herrero, LP
    [J]. Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 196 - 201
  • [30] Routing with Dijkstra in Mobile Ad-Hoc Networks
    Mahmoodi, Khudaydad
    Balcilar, Muhammet
    Amasyali, M. Fatih
    Yavuz, Sirma
    Uzun, Yuecel
    Davletov, Feruz
    [J]. RoboCup 2013: Robot World Cup XVII, 2014, 8371 : 316 - 325