2016
DOI: 10.17487/rfc7859
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Signatures for Mobile Ad Hoc Network (MANET) Routing Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Removing this one malicious router, once detected, implies rekeying all other routers in the MANET. Asymmetric keys, particularly when using identity-based signatures (such as those specified in [RFC7859]), may give the possibility of revoking single routers and verifying their identity based on the ICV itself.…”
Section: Inconsistent Topologymentioning
confidence: 99%
“…Removing this one malicious router, once detected, implies rekeying all other routers in the MANET. Asymmetric keys, particularly when using identity-based signatures (such as those specified in [RFC7859]), may give the possibility of revoking single routers and verifying their identity based on the ICV itself.…”
Section: Inconsistent Topologymentioning
confidence: 99%
“…If, for example, it is used with a shared key (as per [RFC7183]), excluding single attackers generally is not aided by the use of ICVs. However, if routers have sufficient capabilities to support the use of asymmetric keys (as per [RFC7859]), part of addressing this challenge becomes one of providing key revocation in a way that does not in itself introduce additional vulnerabilities.…”
Section: Security Considerationsmentioning
confidence: 99%