Skip to main content

An Efficient Certificate Authority for Ad Hoc Networks

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4882))

Abstract

The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on any centralized or specified entities such as base stations or access points. With these networks finding more applications, the need for adequate security mechanism is increasingly becoming important. Key management is an essential cryptographic primitive upon which other security protocols are built. However, most of the existing key management schemes are not feasible in ad hoc networks because public key infrastructures with a centralized certification authority are hard to deploy there. In this paper, we propose and evaluate a mechanism of distributed certification authority based on threshold cryptography that is suited for wireless ad hoc networks. In the proposed scheme, a collection of nodes acts as the certificate authority and provides the certification service. The feasibility of the proposed scheme is verified by simulation. The results show the effectiveness of the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In: PKI 2003. 2nd Annual PKI Research Workshop Program, Gaithersburg, Maryland (2003)

    Google Scholar 

  2. Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: New Security Paradigms Workshop 1997, ACM Press, New York (1997)

    Google Scholar 

  3. Zhou, L., Haas, Z.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  4. Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: ACM MobiHoc 2001, Long Beach, CA, USA (2001)

    Google Scholar 

  5. Zimmerman, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)

    Google Scholar 

  6. Eshenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad Hoc Networks. In: Security Protocols Workshop, Cambridge (2002)

    Google Scholar 

  7. Kong, J., Zefros, P., Luo, H., Lu, S., Zhang, L.: Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: 9th International Conference on Network Protocols (ICNP), pp. 251–260 (November 2001)

    Google Scholar 

  8. Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad Hoc Networks. In: 4th International Conference on Information Security and Cryptology (ICISC), Seoul (December 2001)

    Google Scholar 

  9. Shamir, A.: How to Share a Secret. Communications of the ACM (1979)

    Google Scholar 

  10. Shoup, V.: Practical Threshold Signatures. Theory and Applications of Cryptographic Techniques, 207–220 (2000)

    Google Scholar 

  11. Asokan, N., Ginzboorg, P.: Key Agreement in Ad Hoc Networks. Computer Communications 23 (2000)

    Google Scholar 

  12. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomasz Janowski Hrushikesha Mohanty

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sen, J., Subramanyam, H. (2007). An Efficient Certificate Authority for Ad Hoc Networks. In: Janowski, T., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2007. Lecture Notes in Computer Science, vol 4882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77115-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77115-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77112-8

  • Online ISBN: 978-3-540-77115-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics