Corpus ID: 3755646

Authenticated and efficient key management for wireless ad hoc networks

@inproceedings{Seys2003AuthenticatedAE,
  title={Authenticated and efficient key management for wireless ad hoc networks},
  author={S. Seys and B. Preneel},
  year={2003}
}
  • S. Seys, B. Preneel
  • Published 2003
  • Computer Science
  • In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Two objectives were crucial in our design: (1) distributed trust to ensure robustness, and (2) strong authentication to prevent the battery drain attack. We achieve distributed trust by presenting a hierarchical and distributed public key infrastructure for ad hoc networks. Our PKI has been designed to map onto hierarchical ad hoc networks, while maintaining global connectivity and flexibility. If a… CONTINUE READING
    12 Citations

    Figures and Topics from this paper

    Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges
    • 13
    Security in Ad Hoc Networks: From Vulnerability to Risk Management
    • 15
    • PDF
    Security Issues for Distributed Sensor Networks
    • 4
    • PDF
    Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
    • 44
    • Highly Influenced
    • PDF
    Survey Report on MANETs Trust Management
    • 1
    • PDF
    A Comprehensive Study of Security of Internet-of-Things
    • A. Mosenia, N. Jha
    • Computer Science
    • IEEE Transactions on Emerging Topics in Computing
    • 2017
    • 283

    References

    SHOWING 1-10 OF 19 REFERENCES
    The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
    • 1,436
    • PDF
    Mitigating routing misbehavior in mobile ad hoc networks
    • 4,081
    • PDF
    Optimal-resilience proactive public-key cryptosystems
    • 245
    Piconet: embedded mobile networking
    • 239
    • PDF
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
    • 743
    • PDF
    Threshold Cryptosystems
    • 1,105
    • PDF
    Efficient generation of shared RSA keys
    • 399
    Publicly Verifiable Secret Sharing
    • 468
    • PDF
    A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
    • 460
    • PDF