DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Dae-Seon | ko |
dc.contributor.author | Lee, Youn-Ho | ko |
dc.contributor.author | Park, Yong-Su | ko |
dc.contributor.author | Jin, Seung-Hun | ko |
dc.contributor.author | Yoon, Hyun-Soo | ko |
dc.date.accessioned | 2013-08-14T01:30:59Z | - |
dc.date.available | 2013-08-14T01:30:59Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2008-11 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON COMMUNICATIONS, v.E91B, no.11, pp.3574 - 3583 | - |
dc.identifier.issn | 0916-8516 | - |
dc.identifier.uri | http://hdl.handle.net/10203/175069 | - |
dc.description.abstract | This paper presents a fully self-organized key management scheme for mobile ad hoc networks. Unlike most previous schemes. there is no priori shared secret or no priori trust relationship in the proposed schemed every node plays the same role and carries out the same function of key management. The proposed scheme consists of (1) Handshaking (HS) and (2) Certificate request/reply (CRR) procedures. In HS, a node acquires the public key of the approaching node via a secure side channel. In CRR, a node requests certificates of a remote node via a radio channel to the nodes that it has HSed. If the number of received valid certificates that contain the same public key exceeds a given threshold, the node accepts the remote node's public key as valid. Security is rigorously analyzed against various known attacks and network costs are intensively analyzed mathematically. Using this analysis, we provide parameter selection guideline to optimize performance and to maintain security for diverse cases. Simulation results show that every node acquires the public keys of all other nodes at least 5 times faster than in a previous scheme. | - |
dc.language | English | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000261410400020 | - |
dc.identifier.scopusid | 2-s2.0-67651120059 | - |
dc.type.rims | ART | - |
dc.citation.volume | E91B | - |
dc.citation.issue | 11 | - |
dc.citation.beginningpage | 3574 | - |
dc.citation.endingpage | 3583 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON COMMUNICATIONS | - |
dc.identifier.doi | 10.1093/ietcom/e91-b.11.3574 | - |
dc.contributor.localauthor | Yoon, Hyun-Soo | - |
dc.contributor.nonIdAuthor | Park, Yong-Su | - |
dc.contributor.nonIdAuthor | Jin, Seung-Hun | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | ad hoc networks | - |
dc.subject.keywordAuthor | network security | - |
dc.subject.keywordAuthor | key management | - |
dc.subject.keywordAuthor | self-organized | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.