Self-Organized Public Key Management for Mobile Ad Hoc Networks

  title={Self-Organized Public Key Management for Mobile Ad Hoc Networks},
  author={Johann van der Merwe and Dawoud S. Dawoud and Stephen McDonald},
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming security associations in MANETs is more challenging than in conventional networks due to the lack of central authority. The main objective of this paper is to find a low complexity key management scheme that is suitable for self-organized MANETs. The proposed public key management scheme uses subordinate public keys and crypto-based identifiers to eliminate all… CONTINUE READING
Highly Influential
This paper has highly influenced 59 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 1,631 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 571 extracted citations

An analysis of authentication models for MANETs

2014 International Conference on Information Science, Electronics and Electrical Engineering • 2014
View 4 Excerpts
Highly Influenced

Efficient Public Key Certificate Management for Mobile Ad Hoc Networks

EURASIP J. Wireless Comm. and Networking • 2011
View 12 Excerpts
Method Support
Highly Influenced

A self-organized key management scheme for ad hoc networks based on identity-based cryptography

2014 10th International Conference on Communications (COMM) • 2014
View 10 Excerpts
Highly Influenced

Development of a trustworthy authentication system in mobile ad-hoc networks for disaster area

2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) • 2014
View 7 Excerpts
Highly Influenced

Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks

View 4 Excerpts
Method Support
Highly Influenced

1,632 Citations

Citations per Year
Semantic Scholar estimates that this publication has 1,632 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 15 references

Securing ad hoc networks

View 17 Excerpts
Highly Influenced

Security of Discrete Log Cryptosystems in the Random Oracle and Generic Model

C. P. Schnorr, M. Jakobsson
proc. The Mathematics of Public-Key Cryptography , June, 12- 17 1999. • 1999
View 7 Excerpts
Highly Influenced

Crypto-based identifiers (CBIDs): Concepts and applications

ACM Trans. Inf. Syst. Secur. • 2004
View 5 Excerpts
Highly Influenced

Self-Organized Public-Key Management for Mobile Ad Hoc Networks

S. Capkun, L. Buttyan, J.-P. Hubaux
IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52–64, 2003. • 2003
View 4 Excerpts
Highly Influenced

OpenSSL cryptography library,

View 1 Excerpt

Self-securing ad hoc wireless networks

Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications • 2002
View 3 Excerpts

Child-proof authentication for MIPv6 (CAM)

Computer Communication Review • 2001
View 3 Excerpts