Paper
19 March 2013 Public-key management in mobile ad hoc networks
Haifeng Lin, Anna Jiang, Di Bai, Yunfei Liu
Author Affiliations +
Proceedings Volume 8762, PIAGENG 2013: Intelligent Information, Control, and Communication Technology for Agricultural Engineering; 87621W (2013) https://doi.org/10.1117/12.2020161
Event: Third International Conference on Photonics and Image in Agriculture Engineering (PIAGENG 2013), 2013, Sanya, China
Abstract
A mobile ad hoc network is a new type of wireless networking paradigm which, in general, consists of solely mobile hosts and dispenses with infrastructure. One main challenge in design of mobile ad hoc networks is the vulnerability to security attacks. Without physical boundaries, a mobile ad hoc network faces many more security threats than a wired network does. Therefore the security of mobile ad hoc networks is one of the major research interests in wireless communications. In contrast with conventional networks, public key management protocols of mobile ad hoc networks do not based on infrastructures, where we can use trusted third parties or centralized servers for key management. This is because that the topology of mobile ad hoc networks is unknown due to link and node failures and to node mobility. For these factors, traditional key management solutions which require on-line trusted authorities or certificate authorities are not suitable for securing mobile ad hoc networks. In this report, we first review some existed public-key management protocols for mobile ad hoc networks and after that we propose a fully distributed public –key management model which does not need the third trusted authority.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Haifeng Lin, Anna Jiang, Di Bai, and Yunfei Liu "Public-key management in mobile ad hoc networks", Proc. SPIE 8762, PIAGENG 2013: Intelligent Information, Control, and Communication Technology for Agricultural Engineering, 87621W (19 March 2013); https://doi.org/10.1117/12.2020161
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Mobile communications

Wireless communications

Cryptography

Network architectures

Agriculture

Back to Top