Certificate Management System in MANET for Ubiquitous Computing

  • Dae-Young Lee
  • Sang-Hyun Bae
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4088)


This study addressed security requirements for ad-hoc network environments, which lies at the heart of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by its ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.


Cluster Head Secret Share Ubiquitous Computing Cluster Member Threshold Cryptography 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M.: The Computer for the 21st Century. Scientific American 265, 94–104 (1991)CrossRefGoogle Scholar
  2. 2.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), p. 251. IEEE Computer Society, Los Alamitos (2001)Google Scholar
  3. 3.
    Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc network. ACM Mobicom (August 2000)Google Scholar
  4. 4.
    Zhou, L., Hass, Z.: Securing ad hoc networks. IEEE Network. pp. 24–30 (November/ December 1999)Google Scholar
  5. 5.
    Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)Google Scholar
  6. 6.
    Jarecki, S.: Proactive Secret Sharing and Public Key Cryptosystems, Master’s Thesis, Dept. Elec. Eng. and Comp. Sci., MIT (September 1995)Google Scholar
  7. 7.
    Herzberg, A., et al.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 457–469. Springer, Heidelberg (1995)Google Scholar
  8. 8.
    Frankel, Y., et al.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440–454. Springer, Heidelberg (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dae-Young Lee
    • 1
  • Sang-Hyun Bae
    • 1
  1. 1.Dept. of Computer Science & StatisticsCollege of Natural Sciences of Chosun UniversityGwang-juKorea

Personalised recommendations