Key agreement in ad hoc networks

@article{Asokan2000KeyAI,
  title={Key agreement in ad hoc networks},
  author={N. Asokan and Philip Ginzboorg},
  journal={Comput. Commun.},
  year={2000},
  volume={23},
  pages={1627-1637}
}
We encounter new types of security problems in ad hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and they do not share any other prior electronic context. How can they set up a secure session among their computers? We examine various alternatives and propose new protocols for password-based multi… Expand
An efficient group key agreement protocol for ad-hoc networks
  • R. Rahman, M. Rahman
  • Computer Science
  • 2008 International Conference on Electrical and Computer Engineering
  • 2008
A three round authenticated group key agreement protocol for ad hoc networks
Key agreement in ad hoc networks
Key Agreement in Ad Hoc Networks
Shared RSA key generation in a mobile ad hoc network
ID-Based Key Agreement with Anonymity for Ad Hoc Networks
Abstract—ad Hoc Networks Are Characterized by Multi-hop
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 13 REFERENCES
Authenticated group key agreement and friends
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
The Secure Remote Password Protocol
Communication complexity of group key distribution
Extended password key exchange protocols immune to dictionary attack
  • David P. Jablon
  • Computer Science
  • Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
  • 1997
Number theoretic attacks on secure password schemes
  • S. Patel
  • Computer Science
  • Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
  • 1997
Encrypted key exchange: password-based protocols secure against dictionary attacks
  • S. Bellovin, Michael Merritt
  • Computer Science
  • Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1992
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
  • S. Lucks
  • Computer Science
  • Security Protocols Workshop
  • 1997
...
1
2
...