scispace - formally typeset
Open Access

MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks

TLDR
This paper presents the MOCA (MObile Certificate Authority) key management framework designed to provide authentication service for ad hoc wireless networks, and presents a set of guidelines for a secure configuration of threshold cryptography to maintain strong security.
Abstract
An authentication service is one of the the most fundamental building blocks for providing communication security. In this paper, we present the MOCA (MObile Certificate Authority) key management framework designed to provide authentication service for ad hoc wireless networks. MOCA is a distributed certificate authority (CA) based on threshold cryptography. We present a set of guidelines for a secure configuration of threshold cryptography to maintain strong security. MOCA utilizes a carefully selected set of mobile nodes to function as a collective certificate authority while the MOCA nodes are kept anonymous. Equipped with a novel routing protocol designed to support the unique communication pattern for certification traffic, MOCA achieves high availability without sacrificing security. Both the security of the framework and the operational performance is evaluated with rigorous analysis and extensive simulation study.

read more

Citations
More filters
Journal ArticleDOI

A survey of security issues in mobile ad hoc and sensor networks

TL;DR: Several security issues involved in this article include routing and data forwarding, medium access, key management and intrusion detection systems (IDSs), namely, wireless sensor networks (WSNs).
Journal ArticleDOI

A survey on peer-to-peer key management for mobile ad hoc networks

TL;DR: The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs) and discusses and provides comments on the strategy of each group separately.
Journal ArticleDOI

Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks

TL;DR: A novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem that enhances network security and survivability against node capture and employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes.
Journal ArticleDOI

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

TL;DR: IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information, which eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public- key management schemes.
Journal ArticleDOI

Security Framework for Wireless Communications in Smart Distribution Grid

TL;DR: A new intrusion detection and response scheme, called smart tracking firewall, is developed to meet the special requirements of SDG wireless communications and results show that it can quickly detect and respond to security attacks and is suitable for real-time operation of an SDG.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Proceedings ArticleDOI

A performance comparison of multi-hop wireless ad hoc network routing protocols

TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.