메뉴 건너뛰기




Volumn 3, Issue 4, 2006, Pages 386-399

Securing mobile ad hoc networks with certificateless public keys

Author keywords

ID based cryptography; Key management; Mobile ad hoc networks; Secret sharing; Security

Indexed keywords

BROADCASTING; INFORMATION MANAGEMENT; MOBILE COMPUTING; PARAMETER ESTIMATION; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33751529199     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2006.58     Document Type: Article
Times cited : (174)

References (49)
  • 1
    • 4143071452 scopus 로고    scopus 로고
    • A survey of wireless security in mobile ad hoc networks: Challenges and available solutions
    • X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer Publisher, Mar.
    • W. Lou and Y. Fang, "A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions," Ad Hoc Wireless Networking, X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer Publisher, Mar. 2003.
    • (2003) Ad Hoc Wireless Networking
    • Lou, W.1    Fang, Y.2
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Networks, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 5
    • 84943517115 scopus 로고    scopus 로고
    • On the unitility of distributed cryptography in P2P and manets: The case of membership control
    • Nov.
    • M. Narasimha, G. Tsudik, and J.H. Yi, "On the Unitility of Distributed Cryptography in P2P and Manets: The Case of Membership Control," Proc. IEEE Int'l Conf. Network Protocols, Nov. 2003.
    • (2003) Proc. IEEE Int'l Conf. Network Protocols
    • Narasimha, M.1    Tsudik, G.2    Yi, J.H.3
  • 8
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • Dec.
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 9
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • A. Shamir, "Identity Based Cryptosystems and Signature Schemes," Proc. CRYPTO'84, pp. 47-53, 1984.
    • (1984) Proc. CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 13
    • 24144449947 scopus 로고    scopus 로고
    • AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks
    • May
    • Y. Zhang, W. Liu, W. Lou, Y. Fang, and Y. Kwon, "AC-PKI: Anonymous and Certificateless Public-Key Infrastructure for Mobile Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm, pp. 3515-3519, May 2005.
    • (2005) Proc. IEEE Int'l Conf. Comm , pp. 3515-3519
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4    Kwon, Y.5
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Aug.
    • Y. Desmedt and Y. Frankel, "Threshold Cryptosystems," Proc. CRYPTO '89, pp. 307-315, Aug. 1989.
    • (1989) Proc. CRYPTO '89 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 16
    • 24944445508 scopus 로고
    • NIST, Federal Information Processing Standards PUBlication 180-1, Apr.
    • NIST, "Digital Hash Standard,"Federal Information Processing Standards PUBlication 180-1, Apr. 1995.
    • (1995) Digital Hash Standard
  • 17
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks
    • Mar.
    • Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM '05, pp. 1940-1951, Mar. 2005,
    • (2005) Proc. IEEE INFOCOM '05 , pp. 1940-1951
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 19
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public key management for mobile ad hoc networks
    • Jan.-Mar.
    • S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-Organized Public Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 23
    • 0003508562 scopus 로고    scopus 로고
    • NIST, Federal Information Processing Standards Publication 186-2, Feb.
    • NIST, "Digital Signature Standard," Federal Information Processing Standards Publication 186-2, Feb. 2000.
    • (2000) Digital Signature Standard
  • 25
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad hoc network routing protocols
    • M. Bohio and A. Miri, "Efficient Identity-Based Security Schemes for Ad Hoc Network Routing Protocols," Elsevier Ad Hoc Networks J., vol. 2, no. 3, pp. 309-317, 2004.
    • (2004) Elsevier Ad Hoc Networks J. , vol.2 , Issue.3 , pp. 309-317
    • Bohio, M.1    Miri, A.2
  • 26
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • Sept.
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
    • (2006) IEEE Trans. Wireless Comm. , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 27
    • 84874324906 scopus 로고    scopus 로고
    • Identify-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identify-Based Encryption from the Weil Pairing," Proc. CRYPTO '01, pp. 213-229, 2001.
    • (2001) Proc. CRYPTO '01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 28
    • 0037623983 scopus 로고    scopus 로고
    • Identify-based encryption from the weil pairing
    • Mar.
    • D. Boneh and M. Franklin, "Identify-Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, Mar. 2003.
    • (2003) SIAM J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 29
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Proc. CRYPTO '02, pp. 354-368, 2002.
    • (2002) Proc. CRYPTO '02 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 31
    • 4544363339 scopus 로고    scopus 로고
    • SIP: A Secure Incentive Protocol against selfishness in mobile ad hoc networks
    • Mar.
    • Y. Zhang, W. Lou, and Y. Fang, "SIP: A Secure Incentive Protocol Against Selfishness in Mobile Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking Conf., pp. 1679-1684, Mar. 2004.
    • (2004) Proc. IEEE Wireless Comm. and Networking Conf. , pp. 1679-1684
    • Zhang, Y.1    Lou, W.2    Fang, Y.3
  • 33
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug.
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, Aug. 2000.
    • (2000) Proc. ACM MobiCom
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 34
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Aug.
    • Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," Proc. ACM MobiCom '00, Aug. 2000.
    • (2000) Proc. ACM MobiCom '00
    • Zhang, Y.1    Lee, W.2
  • 35
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Proc. CRYPTO '95, pp. 339-352, 1995.
    • (1995) Proc. CRYPTO '95 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 36
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Nov.
    • M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Conf. Computer and Comm. Security, pp. 62-73, Nov. 1993.
    • (1993) Proc. ACM Conf. Computer and Comm. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 38
  • 39
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, no. 7, July 1970.
    • (1970) Comm. ACM , vol.13 , Issue.7
    • Bloom, B.1
  • 41
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc On-Demand Distance Vector (AODV) routing
    • July
    • C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector (AODV) Routing," RFC 3561, July 2003.
    • (2003) RFC , vol.3561
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 43
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: Anonymous on Demand Routing with untraceable routes for mobile ad-hoc networks
    • Jun.
    • J. Kong and X. Hong, "ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks," Proc. ACM MobiHoc '03, Jun. 2003.
    • (2003) Proc. ACM MobiHoc '03
    • Kong, J.1    Hong, X.2
  • 46
    • 84860044238 scopus 로고    scopus 로고
    • Shamus Software Ltd., Miracl library
    • Shamus Software Ltd., Miracl library, http://indigo.ie/~mscott/, 2005.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.