Shushan Zhao

Learn More
Security in mobile ad-hoc networks (MANETs) continues to attract attention after years of research. Recent advances in identity-based cryptography (IBC) sheds light on this problem and has become popular as a solution base. We present a comprehensive picture and capture the state of the art of IBC security applications in MANETs based on a survey of(More)
Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. This protocol starts from a prerequisite secure status and fortifies this status by protecting packets using identity-based cryptography and updating cryptographic keys using threshold(More)
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads to KM-SR interdependency cycle problem. In this paper, we propose an integrated KM-SR scheme that addresses KM-SR interdependency cycle problem. By using identity based(More)
Proxy certificates (PCs) are essential in grid security infrastructure (GSI), but their revocation still remains problematic in grid environments. The mechanisms for normal end entity certificates (EEC) revocation need to be reconsidered or revised for PC revocation in grids. In this paper, we present a new framework that addresses the PC revocation problem(More)
A novel mobile peer-to-peer (MP2P) in cellular networks is presented in this paper. The proposed architecture is based on session initiation protocol (SIP) that is part of the IP multimedia subsystem (IMS) in the third-generation mobile cellular networks. In this architecture, P2P control messages are transported in SIP messages, so called P2PoverSIP. By(More)
Public protection and disaster relief is a promising application area for ad-hoc networks. We propose architecture and show a prototype implementation of an application for helping network deployment on the scene. The application has a graphical interface showing network status and proposing actions for additional measures to ensure the uninterrupted and(More)