2011 International Conference on Emerging Trends in Electrical and Computer Technology 2011
DOI: 10.1109/icetect.2011.5760259
|View full text |Cite
|
Sign up to set email alerts
|

Mobile agent based composite key management scheme for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Huang and Nicol [18] proved that the shortest certificate chain does not guarantee the most trustworthy path to obtain the public key of a target node due to different trustworthiness observed in each intermediate node on the certificate chain. In order for public keys and their certificates to be managed by trustworthy CAs in the hierarchical public key management structure, Xu et al [24] and PushpaLakshimi et al [22] used cluster heads as trustworthy CAs based on their trust in the system. However, these works [24,22] still reveal a single point of failure and did not show specific trust models and attacks considered.…”
Section: Dahshan and Irvinmentioning
confidence: 99%
See 4 more Smart Citations
“…Huang and Nicol [18] proved that the shortest certificate chain does not guarantee the most trustworthy path to obtain the public key of a target node due to different trustworthiness observed in each intermediate node on the certificate chain. In order for public keys and their certificates to be managed by trustworthy CAs in the hierarchical public key management structure, Xu et al [24] and PushpaLakshimi et al [22] used cluster heads as trustworthy CAs based on their trust in the system. However, these works [24,22] still reveal a single point of failure and did not show specific trust models and attacks considered.…”
Section: Dahshan and Irvinmentioning
confidence: 99%
“…In order for public keys and their certificates to be managed by trustworthy CAs in the hierarchical public key management structure, Xu et al [24] and PushpaLakshimi et al [22] used cluster heads as trustworthy CAs based on their trust in the system. However, these works [24,22] still reveal a single point of failure and did not show specific trust models and attacks considered. Wu et al [19] proposed a key management protocol for MAENTs for efficiency in updating certificates and security in key revocation.…”
Section: Dahshan and Irvinmentioning
confidence: 99%
See 3 more Smart Citations