TY - GEN
T1 - Locality driven key management architecture for mobile ad-hoc networks
AU - Xu, Gang
AU - Iftode, Liviu
PY - 2004
Y1 - 2004
N2 - A fundamental issue of securing mobile ad-hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal building block to construct the authentication service. Although this is already mature in the Internet applications, providing public key based authentication is still very challenging in mobile ad-hoc networks because the entire network is world-accessible via wireless channel, the environment is highly volatile and infrastructureless and there is lack of trust in the system. In this paper, we propose a locality driven key management architecture that achieves robust key authentication and facilitates timely and efficient establishment of distributed trust. The architecture reflects our application oriented view of MANET and is based on threshold cryptography to achieve high fault tolerance against network partition and malicious nodes. On top of it, we design distributed trust protocols to help set up trust relations on-the-fly. To verify the concept and the design, we implement the prototype and simulate our solution in a variety of scenarios.
AB - A fundamental issue of securing mobile ad-hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal building block to construct the authentication service. Although this is already mature in the Internet applications, providing public key based authentication is still very challenging in mobile ad-hoc networks because the entire network is world-accessible via wireless channel, the environment is highly volatile and infrastructureless and there is lack of trust in the system. In this paper, we propose a locality driven key management architecture that achieves robust key authentication and facilitates timely and efficient establishment of distributed trust. The architecture reflects our application oriented view of MANET and is based on threshold cryptography to achieve high fault tolerance against network partition and malicious nodes. On top of it, we design distributed trust protocols to help set up trust relations on-the-fly. To verify the concept and the design, we implement the prototype and simulate our solution in a variety of scenarios.
UR - http://www.scopus.com/inward/record.url?scp=20344362166&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=20344362166&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:20344362166
SN - 0780388151
SN - 9780780388154
T3 - 2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
SP - 436
EP - 446
BT - 2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
T2 - 2004 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
Y2 - 25 October 2004 through 27 October 2004
ER -