Secure emergency communication of cellular phones in ad hoc mode
نویسندگان
چکیده
In this paper we discuss the unique security characteristics of cell phones in ad hoc mode for emergency applications. We assume as first security requirements: secure authentication with non-repudiation, the need to stop the spread of malicious information as soon as possible, and the defence against potential Denial of Service. We provide solutions to the above security challenges for cell phone in ad hoc mode for emergency applications. In particular, we take advantage of the fact that cell phones were once part of a centralized network, which makes the distribution of security and trust information easier. We use identity based Cryptography to solve the problem of secure authenticated broadcast with non-repudiation. 2006 Elsevier B.V. All rights reserved.
منابع مشابه
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency...
متن کاملEmergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional communication infrastructures such as landline or cellular networks are damaged and don’t provide adequate communication services to first responders for exchanging emergency related information. Wireless ad hoc network...
متن کاملMachine-to-Machine Communications and Security Solution in Cellular Systems
This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and securi...
متن کاملDesign and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Recent advancements in wireless communication technologies have attracted ad-hoc networking, which enables mobile users to communicate with each other without any infrastructure. While many ad-hoc routing protocols have been proposed, ad-hoc communication and its applications are not widespread. To expedite the widespread use of ad-hoc communications, we turn our attention to the handiest wirel...
متن کاملElliptic curve and password based dynamic key agreement in wireless ad-hoc networks
Ad-hoc networking is a relatively new operating mode for rapid mobile host interconnection. However, it suffers from the lack of a fixed infrastructure that forces each adhoc host to rely on each other, in order to maintain the network stability and functionality. This singularity of adhoc networks introduces several issues, most of which concern the system’s security. This paper focuses on inv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc Networks
دوره 5 شماره
صفحات -
تاریخ انتشار 2007