Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks

Ad hoc networking technologies allow mobile devices to communicate by utilizing one another as communication relays. Resulting networks are highly dynamic, with nodes entering and leaving the network, for short duration membership. This absence of structure complicates planning in these networks, re...

Full description

Saved in:
Bibliographic Details
Published inSecurity Protocols pp. 274 - 282
Main Authors Burmester, Mike, Yasinsac, Alec
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Ad hoc networking technologies allow mobile devices to communicate by utilizing one another as communication relays. Resulting networks are highly dynamic, with nodes entering and leaving the network, for short duration membership. This absence of structure complicates planning in these networks, resulting in networks with limited functionality when their topology (their nodes and links) has highly varying and unpredictable characteristics. We propose protocols for a Public Key Infrastructre (PKI) suitable for ad hoc networks that are based on threshold cryptography technology, adapted to general access structures.
Bibliography:This material is based on work supported in part by the U.S. Army Research Laboratory and the U.S. Army Research Office under grant number DAAD 19-02-0235.
ISBN:9783540283898
3540283897
ISSN:0302-9743
1611-3349
DOI:10.1007/11542322_33