2005
DOI: 10.1155/wcn.2005.579
|View full text |Cite
|
Sign up to set email alerts
|

Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis

Abstract:

Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ad hoc networks. In the proposed modification, redundancy is introduced by allocating more than one share to each node in order to increase the probability of creating the certificate for a node in a highly mobile network. A probabilistic analysis is carried out to analyze the t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 21 publications
0
25
0
Order By: Relevance
“…We illustrate the query post-processing procedure through the following example: Given the plaintext values {10, 11,13,14,17} with δ = 0.5, and the weights {0. 1 …”
Section: Efficient Query Processing Over Encrypted Datamentioning
confidence: 99%
See 1 more Smart Citation
“…We illustrate the query post-processing procedure through the following example: Given the plaintext values {10, 11,13,14,17} with δ = 0.5, and the weights {0. 1 …”
Section: Efficient Query Processing Over Encrypted Datamentioning
confidence: 99%
“…To fulfill the security requirements raised by the distributed data storage, recent research has started studying distributed access control, data confidentiality, and data integrity. [11] introduced a redundancy-based key distribution scheme that utilizes secret sharing to achieve a decentralized certificate authority. [12] studied to perform secure distributed data storage by developing an adaptive polynomial-based data storage scheme.…”
Section: Introductionmentioning
confidence: 99%
“…al propose a fully distributed certificate authority scheme based on secret sharing and redundancy [61]. In secret sharing mechanism, the certificate authority's private key is first divided into parts.…”
Section: Joshi's Approachmentioning
confidence: 99%
“…Ref. [33] suggests more shares per node to succeed also with less than k neighbors. In effect, this solution gives little else than reducing the value of k. Distributing the CA functionality boosts the availability of private key shares.…”
Section: ) Public Key Schemesmentioning
confidence: 99%