The paper shows how Security Information for user authenticatwn, peer-entity authentication and access control is created and utilised in huge distributed systems. The protection mechanism used are hash functions, symmetric and asymmetric cryptography. We describe and combine data formats for Security Information based on international standards from several standardisation bodies.
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc networks with a planned origin, and where a common point of trust exists. Mobile ad hoc networks have limited available bandwidth. The revocation lists must therefore be specific to the network. They are established with the aid of trusted gateways reporting the identity of the nodes to a central trusted entity. To minimize overhead, the revocation lists are distributed along with the routing messages. In the articles we discuss how the scheme can be implemented in conjunction with the predominant routing protocols in ad hoc networks. The article also provides a detailed security analysis of the proposed protocols, partly based on the use of formal methods.
This paper proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs); the MRL scheme. A MRL is a revocation list for a specific MANET instantiation. The scheme is designed for revocation of keys used to protect the ad hoc network service, and the MRLs are distributed with the routing messages. MRLs are established with the aid of trusted gateways reporting MANET nodes to a central trusted entity. The trusted gateways must be able to detect which nodes are in the MANET. This comes intrinsically with proactive ad hoc routing protocols, and may be achieved at some additional cost with reactive protocols. The scheme is intended for ad hoc networks with a planned origin, and where a common point of trust exists.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.