2012
DOI: 10.1007/978-3-642-32615-8_37
|View full text |Cite
|
Sign up to set email alerts
|

Bio-inspired Self-organized Public Key Authentication Mechanism for Mobile Ad-hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…In regard to multi-hop and dynamic topology characteristics in MANETs, performing authentication process by a single trusted party is not feasible. One proposed mechanism [1] is to enable each node to create their public/private key pairs and make their public key available, while keeping the private key secrete. A serious problem in most self-organizing authentication mechanism is to create a web of trust based on the observed behaviors of the individuals in the network.…”
Section: Introductionmentioning
confidence: 99%
“…In regard to multi-hop and dynamic topology characteristics in MANETs, performing authentication process by a single trusted party is not feasible. One proposed mechanism [1] is to enable each node to create their public/private key pairs and make their public key available, while keeping the private key secrete. A serious problem in most self-organizing authentication mechanism is to create a web of trust based on the observed behaviors of the individuals in the network.…”
Section: Introductionmentioning
confidence: 99%
“…The authentication mechanisms proposed in this thesis is based on a self-organized authentication mechanism without relying on any central authority and any predefined web of trust [53][54] The scheme allows nodes to create their own publicprivate key pair and issue certificates for neighboring nodes in the network. Certificates are locally stored on each node and are distributed by them in the network.…”
Section: Thesis Authentication Mechanismmentioning
confidence: 99%
“…In this thesis we consider a mobile ad hoc environment, in which all nodes perform five main processes to authenticate the destination node in order to have a secure communication [53] [54]. Different processes are applied to obtained trustful multicertificate chain.…”
Section: Chapter 5 Proposed Self-organized Authentication System Desc...mentioning
confidence: 99%