2007
DOI: 10.1016/j.comcom.2006.12.024
|View full text |Cite
|
Sign up to set email alerts
|

Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
1

Year Published

2009
2009
2012
2012

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 15 publications
0
10
0
1
Order By: Relevance
“…The drawback of this approach is to assume that trust is transitive and the system becomes more vulnerable to the intrusion of malicious nodes. Satizabal et al [17] proposed an extension of Hubaux et al's [10] work by simplifying the certification path discovery. The authors present a protocol to establish a virtual hierarchy among the nodes in the network based on peer-to-peer PKI.…”
Section: Self-organized Pkimentioning
confidence: 99%
“…The drawback of this approach is to assume that trust is transitive and the system becomes more vulnerable to the intrusion of malicious nodes. Satizabal et al [17] proposed an extension of Hubaux et al's [10] work by simplifying the certification path discovery. The authors present a protocol to establish a virtual hierarchy among the nodes in the network based on peer-to-peer PKI.…”
Section: Self-organized Pkimentioning
confidence: 99%
“…We quote the Hubaux et al's [6] approach and Satizabal et al's [23] system. In these systems, each user is able to generate a certificate for other users.…”
Section: A Certification Authority In Manetmentioning
confidence: 99%
“…In classical Public Key Infrastructure (PKI) [9], a Registration Authority (RA) is used to collect and analyze users' requests before forwarding them to a CA to certify, issue and renew user's digital certificate. In Mobile Ad hoc Networks (MANETs), a decentralized certificate authority approach [6], [10], [23] is proposed, due to MANET characteristics, as a solution to avoid single point of failure, MANET attacks and consider nodes' mobility. To handle these requirements, a distributed clustering algorithm is proposed in [22] to cluster nodes based on a set of trusted nodes that belong to a confident community.…”
Section: Introductionmentioning
confidence: 99%
“…Different business corporations deploy different types of PKIs such as Single CA, Hierarchical, Bridge, Hybrid, and Mesh PKI [1] [2] [3]. The Mesh architecture is most widely used in applications such as MANET [4] [5], but certificate path development is more complex than in a hierarchy. Unlike a hierarchy, building a certificate path from a user"s certificate to a trust point is nondeterministic.…”
Section: Introductionmentioning
confidence: 99%