Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing, 2(1):52\textendash64, IEEE Educational Activities Department, Piscataway, NJ, USA, 2003.
Self-Organized Public-Key Management for Mobile Ad Hoc Networks [link]Paper  doi  abstract   bibtex   
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. In this paper, we propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.
@article {766661,
	title = {Self-Organized Public-Key Management for Mobile Ad Hoc Networks},
	journal = {IEEE Transactions on Mobile Computing},
	volume = {2},
	number = {1},
	year = {2003},
	pages = {52{\textendash}64},
	publisher = {IEEE Educational Activities Department},
	address = {Piscataway, NJ, USA},
	abstract = {In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. In this paper, we propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.},
	keywords = {ad-hoc networks, key authentication, PGP, public key cryptography, self-organization},
	issn = {1536-1233},
	doi = {10.1109/TMC.2003.1195151},
	url = {http://portal.acm.org/citation.cfm?id=766655.766661$\#$}
}

Downloads: 0