Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
スポンサーリンク
概要
- 論文の詳細を見る
This paper presents a fully self-organized key management scheme for mobile ad hoc networks. Unlike most previous schemes, there is no priori shared secret or no priori trust relationship in the proposed scheme; every node plays the same role and carries out the same function of key management. The proposed scheme consists of (1) Handshaking (HS) and (2) Certificate request/reply (CRR) procedures. In HS, a node acquires the public key of the approaching node via a secure side channel. In CRR, a node requests certificates of a remote node via a radio channel to the nodes that it has HSed. If the number of received valid certificates that contain the same public key exceeds a given threshold, the node accepts the remote nodes public key as valid. Security is rigorously analyzed against various known attacks and network costs are intensively analyzed mathematically. Using this analysis, we provide parameter selection guideline to optimize performance and to maintain security for diverse cases. Simulation results show that every node acquires the public keys of all other nodes at least 5 times faster than in a previous scheme.
- (社)電子情報通信学会の論文
- 2008-11-01
著者
-
Yoon Hyunsoo
Korea Advanced Inst. Of Sci. And Technol. (kaist) Kor
-
Yoon Hyunsoo
Eecs Kaist
-
CHOI Daeseon
EECS Department at KAIST
-
LEE Younho
EECS Department at KAIST
-
PARK Yongsu
College of Information and Communications at Hanyang Univ.
-
JIN Seung-hun
EECS Department at KAIST
-
Park Yongsu
College Of Information And Communications Hanyang University
-
Yoon Hyunsoo
Eecs Department At Kaist
関連論文
- VAMSD : Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage
- A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems
- Improving Handover Quality in 4G Mobile Systems
- Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
- A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
- Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
- Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment(Application Information Security)
- User-Perceived QoS in a Wireless Packet Network with Multiple Channel Conditions( Multimedia QoS Evaluation and Management Technologies)
- Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems(Mobile Communication, Wireless Technologies and Computational Electromagnetics)
- Securing Mobile Agents by Integrity-Based Encryption(Software Agent and Its Applications)
- Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning(Network, Ubiquitous Networks)
- A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
- A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks(Ad Hoc Network)(Networking Technologies for Mobile Internet Systems)
- An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading(Networks)
- Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks