Toward Secure Key Distribution in Truly Ad-Hoc Networks
نویسندگان
چکیده
Ad-hoc networks — and in particular wireless mobile ad-hoc networks — have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular, it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has al-
منابع مشابه
Group Key Distribution Schemes for Secure Multicast in Mobile Ad Hoc Networks
In this paper, we give a brief overview of several recent proposals that address the problem of group key distribution in secure multicasting over mobile ad hoc networks. We discuss the requirements and challenges raised from multicast in ad hoc networks in general and group key distribution over mobile ad hoc networks in particular. We also give the analysis of each proposal in terms of effici...
متن کاملSecuring Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applications. A common way of securing multicast group is to establish a cryptographic key known only to the group members. To maintain security, the group key must be updated whenever the group membership changes. A group key...
متن کاملA New Group Key Management Protocol for Wireless Ad-Hoc Networks
Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group c...
متن کاملA Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks
Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to t...
متن کاملDesign of Secure and Energy-Efficient Ad-Hoc Wireless Sensor Networks
Wireless ad-hoc networks are vulnerable to several security threats. How to collect, exchange, and process data in a secure manner and reliably are key issues in such systems. At University of Kentucky, we are investigating security issues in wireless ad-hoc networks and this white paper will discuss initial results toward development of new methods for authentication for in-network data aggreg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003