On a Zero Knowledge and Fiat-Shamir Protocol Based Self-Organized Key Management Algorithm

Article Preview

Abstract:

The Ad hoc network is a mobile wireless self-organized network whose security is likely to be endangered owing to its dynamic topology and wireless communication. The security of the Ad hoc network is based on the key management. This paper covers self-organized key management of the Ad hoc network, and presents a Zero knowledge and Fiat-Shamir protocol based self-organized key management algorithm to secure it.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2945-2948

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A Survey of Security for Mobile Ad Hoc NetWorks Ping Yi, Yichuan Jiang Acta Electronica Sinica 2005.5 893—899 in chinese

Google Scholar

[2] Lidong Zhou , Zygmunt J Haas. Securing ad hoc networks [J ] . IEEE Networks Special Issue on Network Security ,1999 ,13 (6) :24 - 30.

DOI: 10.1109/65.806983

Google Scholar

[3] Zheng Yan. Security in Ad Hoc Networks[ DB/ OL ] . http :/ / citeseer. nj. nec. com/ 536945. html.

Google Scholar

[4] Lidong Zhou , Zygmunt J Haas. Securing ad hoc networks [ J ] . IEEE Networks Special Issue on Network Security ,1999 ,13 (6) :24 - 30.

DOI: 10.1109/65.806983

Google Scholar

[5] Jean-Pierre Hubaux ,Levente Buttyan ,Srdjan Capkun. The quest for security in mobile Ad Hoc networks[A] . Proc of the 2001 ACM International Symposium on Mobile ad hoc networking &computing 2001[C] . Long Beach ,CA ,USA ,2001. 146 - 155.

DOI: 10.1145/501416.501437

Google Scholar

[6] Srdjan Capkun ,Levente Nuttyan ,Jean-Pierre Hubaux. Self-organized public-key Management for mobile ad hoc networks[J ] . IEEE Transactions on mobile computing , January-March ,2003 ,2(1) :52 - 64.

DOI: 10.1109/tmc.2003.1195151

Google Scholar

[7] Shamir A .How to Share a Secret Communications of the ACM 22,1979,612-613

DOI: 10.1145/359168.359176

Google Scholar

[8] Fokine K. Key Management in Ad Hoc Networds LITH-ISY-EX-3322-2002,2002-09-28-

Google Scholar

[9] Jean 2 Pierre Hubaux ,Levente Buttyan ,Srdjan Capkun. The quest for se 2 curity in mobile Ad Hoc networks[A] . Proc of the 2001 ACM Interna 2 tional Symposium on Mobile ad hoc networking &computing 2001[ C] .Long Beach ,CA ,USA ,2001. 146 - 155.

DOI: 10.1145/501416.501437

Google Scholar

[10] Srdjan Capkun ,Levente Nuttyan ,Jean 2 Pierre Hubaux. Self 2 organized public 2 key Management for mobile ad hoc networks[J ] . IEEE Transac 2 tions on mobile computing ,January 2 March ,2003 ,2 (1) :52 - 64.

DOI: 10.1109/tmc.2003.1195151

Google Scholar