Open Access
MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks
Seung Yi,Robin Kravets +1 more
TLDR
This paper presents the MOCA (MObile Certificate Authority) key management framework designed to provide authentication service for ad hoc wireless networks, and presents a set of guidelines for a secure configuration of threshold cryptography to maintain strong security.Abstract:
An authentication service is one of the the most fundamental building blocks for providing communication security. In this paper, we present the MOCA (MObile Certificate Authority) key management framework designed to provide authentication service for ad hoc wireless networks. MOCA is a distributed certificate authority (CA) based on threshold cryptography. We present a set of guidelines for a secure configuration of threshold cryptography to maintain strong security. MOCA utilizes a carefully selected set of mobile nodes to function as a collective certificate authority while the MOCA nodes are kept anonymous. Equipped with a novel routing protocol designed to support the unique communication pattern for certification traffic, MOCA achieves high availability without sacrificing security. Both the security of the framework and the operational performance is evaluated with rigorous analysis and extensive simulation study.read more
Citations
More filters
Journal ArticleDOI
A survey of security issues in mobile ad hoc and sensor networks
TL;DR: Several security issues involved in this article include routing and data forwarding, medium access, key management and intrusion detection systems (IDSs), namely, wireless sensor networks (WSNs).
Journal ArticleDOI
A survey on peer-to-peer key management for mobile ad hoc networks
TL;DR: The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs) and discusses and provides comments on the strategy of each group separately.
Journal ArticleDOI
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
TL;DR: A novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem that enhances network security and survivability against node capture and employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes.
Journal ArticleDOI
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
TL;DR: IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information, which eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public- key management schemes.
Journal ArticleDOI
Security Framework for Wireless Communications in Smart Distribution Grid
Xudong Wang,Ping Yi +1 more
TL;DR: A new intrusion detection and response scheme, called smart tracking firewall, is developed to meet the special requirements of SDG wireless communications and results show that it can quickly detect and respond to security attacks and is suitable for real-time operation of an SDG.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI
Ad-hoc on-demand distance vector routing
C.E. Perkins,E.M. Royer +1 more
TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Proceedings ArticleDOI
A performance comparison of multi-hop wireless ad hoc network routing protocols
TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.