Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks
#1

[attachment=5094]
Binary Tree Based Public-Key Management for
Mobile Ad Hoc Networks


Georgios Kambourakis, Elisavet Konstantinou and Stefanos Gritzalis
Info-Sec-Lab Laboratory of Information and Communications Systems Security
University of the Aegean, Samos GR-83200, Greece
{gkamb, ekonstantinou, sgritz}@aegean.gr

Abstract
The establishment of a Public Key Infrastructure (PKI) in Mobile Ad Hoc Networks (MANETs) is considered a difficult task because of the intrinsic characteristics of these networks. The absence of centralized services and the possible network partitions make traditional security solutions not straightforwardly applicable in MANETs. In this paper, we propose a public key management scheme based on a binary tree formation of the network s nodes. Using the binary tree structure, certificate chains are easily built between communicating nodes that are multi-hops away and the cumbersome problem of certificate chain discovery is avoided. We argue that our mechanism has several advantages over similar solutions, especially when a fair balancing between security and performance is terminus.
Reply

#2

Presented By:
Georgios Kambourakis, Elisavet Konstantinou and Stefanos Gritzalis
Info-Sec-Lab Laboratory of Information and Communications Systems Security
Abstract
The establishment of a Public Key Infrastructure (PKI) in Mobile Ad Hoc Networks (MANETs) is considered a difficult task because of the intrinsic characteristics of these networks. The absence of centralized services and the possible network partitions make traditional security solutions not straightforwardly applicable in MANETs. In this paper, we propose a public key management scheme based on a binary tree formation of the network s nodes. Using the binary tree structure, certificate chains are easily built between communicating nodes that are multi-hops away and the cumbersome problem of certificate chain discovery is avoided. We argue that our mechanism has several advantages over similar solutions, especially when a fair balancing between security and performance is terminus.

read full report
http://ieexplore.ieeiel5/4695855/4725990...er=4726144
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.