MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks

نویسندگان

  • Seung Yi
  • Robin Kravets
چکیده

PKI has been recognized as one of the most effective tools for providing security for dynamic networks. However, providing such an infrastructure in ad hoc wireless networks is a challenging task due to their infrastructure-less nature. In this paper, we present these challenges in detail, identify the requirements for such solutions, and propose a practical PKI service for ad hoc networks. We employ threshold cryptography to distribute the CA functionality over specially selected nodes based on the security and the physical characteristics of nodes. The selected nodes that collectively provide PKI functionality are called MOCA (MObile Certificate Authority)s. Using these MOCAs, we present an efficient and effective communication protocol for correspondence with MOCAs for certification services. Results from our simulations verify the effectiveness and the efficiency of our approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Management for Heterogeneous Ad Hoc Wireless Networks

PKI has been recognized as one of the most successful and important tools for providing security for dynamic networks. However, providing such infrastructure in ad hoc wireless networks is a challenging task due to the infrastructure-less nature of ad hoc networks. In this paper, we present these challenges in detail, identify the requirements for such solutions in ad hoc networks, and propose ...

متن کامل

A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks

An increasing growth has been witnessed in the last few year with respect to development of wireless and mobile communication networks. In MANETs, nodes are able to communicate through the use of wireless mediums, constituting dynamic topologies. The certificate-based authentication has a positive edge in wired networks. It's a significantly arduous task to adapt a certificate based authenticat...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks

The certificate-based authentication is well studied in wired networks. However, adapting certificatebased authentication protocols to mobile ad hoc networks (MANETs) is a nontrivial task, mainly because, in a MANET, as opposed to conventional wired networks, there typically exists no fixed infrastructure or centralized management. For example, a conventional certificate-based authentication sy...

متن کامل

Cluster Based Security Architecture in Wireless Ad-hoc Networks: an Overview

Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. Providing security and anonymity to users are critical in wireless ad hoc networks. Ad hoc networks have lots of applications; however, a vita...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003