Composite key management for ad hoc networks
Submitted by crepric on Fri, 09/18/2009 - 15:57
Title | Composite key management for ad hoc networks |
Publication Type | Conference Articles |
Year of Publication | 2004 |
Authors | Yi, S., and R. Kravets |
Conference Name | Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on |
Date Published | Aug. |
Keywords | ad hoc networks, authentication, certificate chaining, certification, composite key management, message authentication, mobility management (mobile radio), network security, public key cryptography ad hoc network, public key infrastructure, trusted third party |
Abstract | We present composite key management, a novel paradigm for key management in ad hoc networks. While most existing approaches try to fit techniques developed for wired environments into ad hoc networks, our approach works within the specific limitations of ad hoc networks to increase security and availability of the key management framework. By composing techniques from PKI and certificate chaining, composite key management follows two fundamental principles that must be satisfied by an ad hoc key management framework: node participation and the use of a trusted third party. We introduce enhanced metrics of authentication to aid end users in understanding and using the key management framework. Through simulation studies, we demonstrate the effectiveness of composite key management under stressful scenarios where previous approaches fail and show that composite key management can address the challenges posed by the unique nature of ad hoc networks. |
DOI | 10.1109/MOBIQ.2004.1331710 |
Full Text |
|
Attachment | Size |
---|---|
151.09 KB |
- Login to post comments
- Tagged
- XML
- BibTex
- Google Scholar