Skip to main content

Extending OLSR Functionalities to PKI Management

  • Conference paper
Computer Aided Systems Theory – EUROCAST 2011 (EUROCAST 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6927))

Included in the following conference series:

  • 1674 Accesses

Abstract

In self-organized environments such as mobile ad-hoc networks, network members are responsible for developing correctly and efficiently security service management among many others management tasks. The specific objective in the proposal here described is the enhancement of local certificate repositories building processes. The approach considered to meet this goal has been to define an authentication solution based on the web of trust concept combined with some tools belonging to the core of the Optimized Link State Routing (OLSR) protocol. The experimental results obtained show a considerable decrease in resource consumption while carrying out the certificate verification process.

Research partially supported by Spanish TIN2008-02236/TSI Project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clausen, T., Jacquet, P.: RFC 3626: Optimized Link State Routing Protocol, OLSR (2003)

    Google Scholar 

  2. Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl. 30(3), 937–954 (2007)

    Article  Google Scholar 

  3. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Networks 13(6), 24–30 (1999)

    Article  Google Scholar 

  4. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: International Conference on Network Protocols, pp. 251–260 (2001)

    Google Scholar 

  5. Kaliaperumal, S.: Securing authentication and privacy in ad hoc partitioned networks. In: Symposium on Applications and the Internet Workshops, p. 354. IEEE Computer Society, Washington, DC, USA (2003)

    Google Scholar 

  6. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public key management for mobile ad hoc networks. Mobile Computting and Communication Review 6(4) (2002)

    Google Scholar 

  7. Kambourakis, G., Konstantinou, E., Douma, A., Anagnostopoulos, M., Fotiadis, G.: Efficient certification path discovery for MANET. EURASIP Journal on Wireless Communications and Networking, 67–71 (2010)

    Google Scholar 

  8. Satizábal, C., Hernández-Serrano, J., Forné, J., Pegueroles, J.: Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks. Comput. Commun. 30(7), 1498–1512 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hernández-Goya, C., Caballero-Gil, P., Molina-Gil, J., Caballero-Gil, C. (2012). Extending OLSR Functionalities to PKI Management. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2011. EUROCAST 2011. Lecture Notes in Computer Science, vol 6927. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27549-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27549-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27548-7

  • Online ISBN: 978-3-642-27549-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics