Security Protocols

Volume 3364 of the series Lecture Notes in Computer Science pp 274-282

Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks

  • Mike BurmesterAffiliated withDepartment of Computer Science, Florida State University
  • , Alec YasinsacAffiliated withDepartment of Computer Science, Florida State University

* Final gross prices may vary according to local VAT.

Get Access


Ad hoc networking technologies allow mobile devices to communicate by utilizing one another as communication relays. Resulting networks are highly dynamic, with nodes entering and leaving the network, for short duration membership. This absence of structure complicates planning in these networks, resulting in networks with limited functionality when their topology (their nodes and links) has highly varying and unpredictable characteristics.

We propose protocols for a Public Key Infrastructre (PKI) suitable for ad hoc networks that are based on threshold cryptography technology, adapted to general access structures.


Ad hoc networks security access structures threshold cryptography