期刊文献+

A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1

A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks
下载PDF
导出
摘要 This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页 系统工程与电子技术(英文版)
关键词 mobile Ad Hoc networks threshold secret share certification authority. mobile Ad Hoc networks, threshold secret share, certification authority.
  • 相关文献

参考文献13

  • 1Iwata A, Ching-Chuan Chiang. Scalable routing strategies for Ad Hoc wireless networks. Selected Areas in Communications, IEEE Journal, 1999,17(8):1369~1379.
  • 2Srdjan C, Levente B, Jean-Pierre H. Self-organized public-ey management for mobile Ad Hoc networks. IEEE Trans. on Mobile Computing, 2003, 2(1): 52~64.
  • 3Zhou Lidong, Zygmunt J Haas. Securing Ad Hoc networks. IEEE Network, 1999,13(6) :24~30.
  • 4Kong Jiejun, Petros Zerfos, Luo Haiyun, et al. Providing robust and ubiquitous security support for mobile Ad-Hoc networks. IEEE ICNP, 2001:251~260.
  • 5Luo Haiyun, Petros Zerfos, Kong Jiejun, et al. Self-securing Ad Hoc wireless networks. Computers and Communications, 2002: 567~ 574.
  • 6Pramanik S, Upadhyaya S. VPSS: A verifiable proactive secret sharing scheme in distributed systems. IEEE, Military Communications Conference, 2003, 2: 826~831.
  • 7Numao M . A secure key registration system based on proactive secret-sharing scheme. Integration of Heterogeneous Systems, Proceedings, 1999: 230~237.
  • 8Gehrmann C, Nikander P. Securing Ad Hoc services. Mobile and Ad Hoc Networking and Computing, 2000:135~136.
  • 9Zhu Feng, Mutka M, Lionel Ni. Facilitating secure Ad Hoc service discovery in public environments. Computer Software and Applications Conference, 2003: 433~ 438.
  • 10Talpade R, McAuley A. Standardization areas for securing Ad Hoc networks. Circuits and Systems, 2002, 1:619~622.

同被引文献14

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部