Protection against Mobile Adversaries in Mobile Ad-Hoc Networks

被引:0
|
作者
Shi, Ronghua [1 ]
Yan, Yanhua [1 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
关键词
Mobile adversary; mobile Ad-Hoc networks; proactive secret sharing; threshold cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proactive secret sharing scheme (PSS) is very important to withstand mobile adversary in mobile ad-hoc networks (MANETs). It allows a set of nodes to update all shares by generating a new set of shares for the same secret key from the old shares without reconstructing the secret key and it allows the nodes to recovery the lost shares. After periodical renewal, it makes the mobile adversary which wants to get the secret key of the system to attack another set of nodes in a new period. In this paper, we presented a PSS synchronization structure in at? MANET environment and we supply the scheme with the improved share recovery procedure for perfection. Finally we analyze the protocol and outline our future work.
引用
收藏
页码:2026 / 2031
页数:6
相关论文
共 50 条
  • [41] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136
  • [42] Routing protocols in Mobile Ad-hoc Networks
    Mikaric, Bratislav
    Rancic, Dejan
    Ilic, Slavisa
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2020, 96 (08): : 106 - 111
  • [43] Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
    Moudni, Houda
    Er-Rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION (CGIV), 2016, : 385 - 389
  • [44] Mobile service discovery protocol (MSDP) for mobile ad-hoc networks
    Liang, Jui-Chi
    Chen, Jyh-Cheng
    Zhang, Tao
    [J]. EIGHTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2007, : 352 - +
  • [45] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [46] Mobile gateways for mobile ad-hoc networks with network mobility support
    Wakikawa, R
    Matsutani, H
    Koodli, R
    Nilsson, A
    Murai, J
    [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 361 - 368
  • [47] On measuring anonymity for wireless mobile ad-hoc networks
    Huang, Dijiang
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 779 - 786
  • [48] Anonymous secure routing in mobile ad-hoc networks
    Zhu, B
    Wan, ZG
    Kankanhalli, MS
    Bao, F
    Deng, RH
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 102 - 108
  • [49] Cooperative Security Schemes for Mobile Ad-Hoc Networks
    Caballero-Gil, P.
    Hernandez-Goya, C.
    [J]. COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2008, 5220 : 286 - 294
  • [50] Adaptive antenna systems for mobile ad-hoc networks
    Bellofiore, S
    Foutz, J
    Govindarajula, R
    Bahceci, I
    Balanis, CA
    Spanias, AS
    Capone, JM
    Duman, TM
    [J]. 2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL I, PROCEEDINGS, 2002, : 205 - 208