Abstract
MANET has dynamic composition in which nodes are frequently changing, when a node is damaged, reliability between nodes may be changed and they may join in other administrative domains quickly they can rely on. This study suggests security requirements for MANET which can be a base of ubiquitous system and models that can prevent security threat through application of PKI without trusted certificate authority in MANET. It is also solve excessive loading found in centralized control model by dispersing CA for adjustment to dynamic changes of nodes of MANET quickly and suggests a system model which supports expansion so that existing nodes performing communication within clusters can provide active certificate service without being affected by input of new nodes. In addition, it is to evaluate its stability, effectiveness and strength through simulation of the suggested model.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perkins, C.E.: Ad Hoc Networking. Addison Wesley, Reading (2001)
Royer, E.M., Toh, C.-K.: A review of Current Routing Protocols for Ad Hoc Mobile Wireless Network. IEEE Personal Communication, 46–55 (April 1999)
Johnson, D., Maltz, D., Hu, Y.-C., Jetcheva, J.: The dynamic source routing protocol for mobile ad hoc network. IEEE Internet Draft, draft-ietf-manet=dsr-05.txt, (work in progress) (March 2001)
Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (February 1999)
Murthy, S., Garcia-Lunca-Aceves, J.J.: An efficient routing protocol for wireless networks. ACM Mobile Networks and Applications Journal, 183–197 (October 1996)
Herzberg, A., jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public-key and signature schemes. In: proceedings of the Fourth Annual Conference on computer Communications Security, pp. 100–120. ACM, New York (1997)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE Computer Society, Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), p. 251 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, DY., Jeong, HC. (2006). An Efficient Certificate Management for Mobile Ad-Hoc Network. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_29
Download citation
DOI: https://doi.org/10.1007/11814764_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37246-2
Online ISBN: 978-3-540-37248-6
eBook Packages: Computer ScienceComputer Science (R0)