Authenticated and efficient key management for wireless ad hoc networks
@inproceedings{Seys2003AuthenticatedAE, title={Authenticated and efficient key management for wireless ad hoc networks}, author={S. Seys and B. Preneel}, year={2003} }
In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Two objectives were crucial in our design: (1) distributed trust to ensure robustness, and (2) strong authentication to prevent the battery drain attack. We achieve distributed trust by presenting a hierarchical and distributed public key infrastructure for ad hoc networks. Our PKI has been designed to map onto hierarchical ad hoc networks, while maintaining global connectivity and flexibility. If a… CONTINUE READING
Supplemental Presentations
Figures and Topics from this paper
Figures
12 Citations
Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges
- Computer Science
- 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007)
- 2007
- 13
Security in Ad Hoc Networks: From Vulnerability to Risk Management
- Computer Science
- 2009 Third International Conference on Emerging Security Information, Systems and Technologies
- 2009
- 15
- PDF
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
- Computer Science
- J. Netw. Comput. Appl.
- 2012
- 44
- Highly Influenced
- PDF
Cryptographic Algorithms and Protocols for Security and Privacy in Wireless Ad Hoc Networks (Algoritmen en protocollen voor beveiliging en privacy in draadloze ad-hoc netwerken)
- Computer Science
- 2006
- 2
- PDF
Enforcing security in Internet of Things frameworks: A Systematic Literature Review
- Computer Science
- Internet Things
- 2019
- 25
A Comprehensive Study of Security of Internet-of-Things
- Computer Science
- IEEE Transactions on Emerging Topics in Computing
- 2017
- 283
References
SHOWING 1-10 OF 19 REFERENCES
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
- Computer Science
- Security Protocols Workshop
- 1999
- 1,436
- PDF
Optimal-resilience proactive public-key cryptosystems
- Computer Science
- Proceedings 38th Annual Symposium on Foundations of Computer Science
- 1997
- 245
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
- Mathematics, Computer Science
- CRYPTO
- 1995
- 743
- PDF
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
- Mathematics, Computer Science
- CRYPTO
- 1999
- 460
- PDF