Abstract
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on any centralized or specified entities such as base stations or access points. With these networks finding more applications, the need for adequate security mechanism is increasingly becoming important. Key management is an essential cryptographic primitive upon which other security protocols are built. However, most of the existing key management schemes are not feasible in ad hoc networks because public key infrastructures with a centralized certification authority are hard to deploy there. In this paper, we propose and evaluate a mechanism of distributed certification authority based on threshold cryptography that is suited for wireless ad hoc networks. In the proposed scheme, a collection of nodes acts as the certificate authority and provides the certification service. The feasibility of the proposed scheme is verified by simulation. The results show the effectiveness of the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In: PKI 2003. 2nd Annual PKI Research Workshop Program, Gaithersburg, Maryland (2003)
Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: New Security Paradigms Workshop 1997, ACM Press, New York (1997)
Zhou, L., Haas, Z.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)
Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: ACM MobiHoc 2001, Long Beach, CA, USA (2001)
Zimmerman, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)
Eshenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad Hoc Networks. In: Security Protocols Workshop, Cambridge (2002)
Kong, J., Zefros, P., Luo, H., Lu, S., Zhang, L.: Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: 9th International Conference on Network Protocols (ICNP), pp. 251–260 (November 2001)
Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad Hoc Networks. In: 4th International Conference on Information Security and Cryptology (ICISC), Seoul (December 2001)
Shamir, A.: How to Share a Secret. Communications of the ACM (1979)
Shoup, V.: Practical Threshold Signatures. Theory and Applications of Cryptographic Techniques, 207–220 (2000)
Asokan, N., Ginzboorg, P.: Key Agreement in Ad Hoc Networks. Computer Communications 23 (2000)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sen, J., Subramanyam, H. (2007). An Efficient Certificate Authority for Ad Hoc Networks. In: Janowski, T., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2007. Lecture Notes in Computer Science, vol 4882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77115-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-77115-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77112-8
Online ISBN: 978-3-540-77115-9
eBook Packages: Computer ScienceComputer Science (R0)