Secure emergency communication of cellular phones in ad hoc mode

نویسندگان

  • Arjan Durresi
  • Vijay Bulusu
  • Vamsi Paruchuri
  • Leonard Barolli
چکیده

In this paper we discuss the unique security characteristics of cell phones in ad hoc mode for emergency applications. We assume as first security requirements: secure authentication with non-repudiation, the need to stop the spread of malicious information as soon as possible, and the defence against potential Denial of Service. We provide solutions to the above security challenges for cell phone in ad hoc mode for emergency applications. In particular, we take advantage of the fact that cell phones were once part of a centralized network, which makes the distribution of security and trust information easier. We use identity based Cryptography to solve the problem of secure authenticated broadcast with non-repudiation. 2006 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency...

متن کامل

Emergency Response Communications and Associated Security Challenges

The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional communication infrastructures such as landline or cellular networks are damaged and don’t provide adequate communication services to first responders for exchanging emergency related information. Wireless ad hoc network...

متن کامل

Machine-to-Machine Communications and Security Solution in Cellular Systems

This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and securi...

متن کامل

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Recent advancements in wireless communication technologies have attracted ad-hoc networking, which enables mobile users to communicate with each other without any infrastructure. While many ad-hoc routing protocols have been proposed, ad-hoc communication and its applications are not widespread. To expedite the widespread use of ad-hoc communications, we turn our attention to the handiest wirel...

متن کامل

Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks

Ad-hoc networking is a relatively new operating mode for rapid mobile host interconnection. However, it suffers from the lack of a fixed infrastructure that forces each adhoc host to rely on each other, in order to maintain the network stability and functionality. This singularity of adhoc networks introduces several issues, most of which concern the system’s security. This paper focuses on inv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Ad Hoc Networks

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007