Certificate Management System in MANET for Ubiquitous Computing
This study addressed security requirements for ad-hoc network environments, which lies at the heart of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by its ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.
KeywordsCluster Head Secret Share Ubiquitous Computing Cluster Member Threshold Cryptography
Unable to display preview. Download preview PDF.
- 2.Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), p. 251. IEEE Computer Society, Los Alamitos (2001)Google Scholar
- 3.Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc network. ACM Mobicom (August 2000)Google Scholar
- 4.Zhou, L., Hass, Z.: Securing ad hoc networks. IEEE Network. pp. 24–30 (November/ December 1999)Google Scholar
- 5.Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)Google Scholar
- 6.Jarecki, S.: Proactive Secret Sharing and Public Key Cryptosystems, Master’s Thesis, Dept. Elec. Eng. and Comp. Sci., MIT (September 1995)Google Scholar
- 7.Herzberg, A., et al.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 457–469. Springer, Heidelberg (1995)Google Scholar
- 8.Frankel, Y., et al.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440–454. Springer, Heidelberg (1997)Google Scholar