Key management for heterogeneous ad hoc wireless networks

@article{Yi2002KeyMF,
  title={Key management for heterogeneous ad hoc wireless networks},
  author={Seung Yi and Robin Kravets},
  journal={10th IEEE International Conference on Network Protocols, 2002. Proceedings.},
  year={2002},
  pages={202-203}
}
  • Seung Yi, Robin Kravets
  • Published in
    10th IEEE International…
    2002
  • Computer Science
  • Since its birth more than two decades ago, public key cryptography has been recognized as one of the most effective mechanisms for providing fundamental security services including authentication, digital signatures and encryption for dynamic networks. Effective management of keys, or digital certificates holding the keys, is one of the key factors for the successful wide-spread deployment of public key cryptography. The public key infrastructure (PKI ), an infrastructure for managing digital… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 93 CITATIONS

    Intrusion detection and response model for mobile ad hoc networks

    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    A survey of key management in ad hoc networks

    VIEW 8 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Mobile ad hoc network security - a taxonomy

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Key Management for Beyond 5G Mobile Small Cells: A Survey

    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    CLUSTER BASED SECURITY ARCHITECTURE IN WIRELESS AD-HOC NETWORKS : AN OVERVIEW

    VIEW 3 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs

    VIEW 5 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Classification and Review of Security Schemes in Mobile Computing

    VIEW 3 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    A Novel Cross Layer NFCAC Game Algorithm in IEEE 802.16-based Multi-radio Heterogeneous Ad Hoc Networks

    VIEW 3 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2003
    2019

    CITATION STATISTICS

    • 15 Highly Influenced Citations

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 11 REFERENCES

    Practical PKI for Ad Hoc Wireless Networks

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    Providing robust and ubiquitous security support for mobile ad-hoc networks

    Practical Threshold Signatures

    VIEW 2 EXCERPTS

    Securing ad hoc networks

    VIEW 2 EXCERPTS

    A Quick Introduction to Certificate Revocation Trees

    • K. Paul
    • Available at http://www.valicert.com/resources/,
    • 1998
    VIEW 1 EXCERPT

    Proactive RSA The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks

    • P. Gemmell, P. D. MacKenzie, M. Yung
    • Parallel Reliable Threshold Multisignature
    • 1992

    A Performance Comparison of Multi - Hop Wireless Ad Hoc Network Routing Protocols

    • D. A. Maltz Broch, D. B. Johnson, Y. Hu, J. Jetcheva
    • How to Share a Secret . Communications of the ACM
    • 1979

    How to share a secret

    VIEW 1 EXCERPT