Key management for heterogeneous ad hoc wireless networks

Seung Yi, R. Kravets

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Since its birth more than two decades ago, public key cryptography has been recognized as one of the most effective mechanisms for providing fundamental security services including authentication, digital signatures and encryption for dynamic networks. Effective management of keys, or digital certificates holding the keys, is one of the key factors for the successful wide-spread deployment of public key cryptography. The public key infrastructure (PKI ), an infrastructure for managing digital certificates, was introduced for this purpose. The most important component of PKI is the certificate authority (CA), the trusted entity in the system that vouches for the validity of digital certificates. This work describes a framework to provide efficient yet effective distributed CA service for ad hoc wireless networks. We select physically or computationally more secure nodes as MOCAs (MObile Certificate Authority) and use threshold cryptography to distribute the CA's private key among these MOCA nodes. We also provide a protocol for clients to contact MOCAs and get certification services without incurring excessive overhead.

Original languageEnglish (US)
Title of host publicationProceedings - 10th IEEE International Conference on Network Protocols, ICNP 2002
PublisherIEEE Computer Society
Pages202-203
Number of pages2
ISBN (Print)0769518567, 9780769518565
DOIs
StatePublished - 2008
Event10th IEEE International Conference on Network Protocols, ICNP 2002 - Paris, France
Duration: Nov 12 2002Nov 15 2002

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
ISSN (Print)1092-1648

Other

Other10th IEEE International Conference on Network Protocols, ICNP 2002
CountryFrance
CityParis
Period11/12/0211/15/02

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint Dive into the research topics of 'Key management for heterogeneous ad hoc wireless networks'. Together they form a unique fingerprint.

Cite this