dc.contributor.author | Joshi, Deepti | |
dc.contributor.author | Namuduri, Kameswara | |
dc.contributor.author | Pendse, Ravi | |
dc.date.accessioned | 2011-05-22T17:32:11Z | |
dc.date.available | 2011-05-22T17:32:11Z | |
dc.date.issued | 2005-05 | |
dc.identifier.citation | Deepti Joshi, Kamesh Namuduri, and Ravi Pendse. 2005. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis. EURASIP Journal on Wireless Communications and Networking, v.4, pp.579-589. doi:10.1155/WCN.2005.579 | en_US |
dc.identifier.issn | 1687-1499 | |
dc.identifier.uri | http://hdl.handle.net/10057/3489 | |
dc.description | DOI: 10.1155/WCN.2005.579 | |
dc.description.abstract | Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ad hoc networks. In the proposed modification, redundancy is introduced by allocating more than one share to each node in order to increase the probability of creating the certificate for a node in a highly mobile network. A probabilistic analysis is carried out to analyze the trade-offs between the ease of certificate creation and the security provided by the proposed scheme. The analysis carried out from the intruder’s perspective suggests that in the worst-case scenario, the intruder is just “one node” away from a legitimate node in compromising the certificate. The analysis also outlines the parameter selection criteria for a legitimate node to maintain a margin of advantage over an intruder in creating the certificate. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Hindawi Publishing Corporation | en_US |
dc.relation.ispartofseries | EURASIP Journal on Wireless Communications and Networking;v.4 (2005) | |
dc.rights | Open Access article distributed under the Creative Commons Attribution License, which permits
unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | |
dc.subject | Key management schemes | en_US |
dc.subject | Security | en_US |
dc.subject | Sensor networks | en_US |
dc.title | Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis | en_US |
dc.type | Article | en_US |
dc.description.version | Peer reviewed | en_US |
dc.rights.holder | Hindawi Publishing Corporation | |