메뉴 건너뛰기




Volumn 6, Issue 1, 2008, Pages 17-31

A localized certificate revocation scheme for mobile ad hoc networks

Author keywords

Certificate revocation; Hash chain; Key management; MANET security; Public key cryptography; Trust model

Indexed keywords

MOBILE DEVICES; ONLINE SYSTEMS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 34548821880     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.07.003     Document Type: Article
Times cited : (59)

References (52)
  • 1
    • 84947251443 scopus 로고    scopus 로고
    • F. Stajano, R.J. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, in: Proceedings of the 7th International Workshop on Security Protocols, 2000, pp. 172-194.
  • 2
    • 34548818188 scopus 로고    scopus 로고
    • N. Shankar, D. Balfanz, Enabling secure ad-hoc communication using contextaware security services, in: Proceedings of Workshop on Security in Ubiquitous Computing (4 UBICOMP), 2002.
  • 3
    • 0018545449 scopus 로고
    • How to share a secret?
    • Shamir A. How to share a secret?. Communications of the ACM 22 11 (1979) 612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 4
    • 0022199386 scopus 로고    scopus 로고
    • B. Chor, S. Goldwasse, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: Proceedings of 26th IEEE Annual Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383-395.
  • 5
    • 0023538330 scopus 로고    scopus 로고
    • P. Feldman, A practical scheme for non-interactive verifiable secret sharing, in: Proceedings of 28th IEEE Symposium on Foundations of Foundations of Computer Science, 1987, pp. 427-437.
  • 6
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Proceedings of Crypto'91, Springer-Verlag
    • Pedersen T.P. Non-interactive and information-theoretic secure verifiable secret sharing. Proceedings of Crypto'91. LNCS vol. 576 (1991), Springer-Verlag 129-140
    • (1991) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 7
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Proceedings of Eurocrypt 2000, Springer-Verlag
    • Shoup V. Practical threshold signatures. Proceedings of Eurocrypt 2000. LNCS vol. 1807 (2000), Springer-Verlag 207-220
    • (2000) LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 8
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Proceedings of Eurocrypt'96, Springer-Verlag
    • Gennaro R., Jarecki S., Krawczyk H., and Rabin T. Robust threshold DSS signatures. Proceedings of Eurocrypt'96. LNCS vol. 1070 (1996), Springer-Verlag 354-371
    • (1996) LNCS , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network Magazine 13 6 (1999) 24-30
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 10
    • 0345755816 scopus 로고    scopus 로고
    • J. Kong, H. Luo, K. Xu, D.L. Gu, M. Gerla, S. Lu, Adaptive security for multi-layer ad-hoc networks, in: Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press, 2002.
  • 11
    • 3142670764 scopus 로고    scopus 로고
    • B. Lehane, L. Doyle, D. O'Mahony, Shared rsa key generation in a mobile ad hoc network, in: Proceedings of IEEE Military Communications Conference (MILCOM 2003), 2003, pp. 814-819.
  • 12
    • 84943807207 scopus 로고    scopus 로고
    • A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings of 2003 Symposium on Applications and the Internet Workshops, 2003, pp. 342-346.
  • 13
    • 13244255381 scopus 로고    scopus 로고
    • S. Yi, R. Kravits, Composite key management for ad hoc networks, in: Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), 2004, pp. 52-61.
  • 14
    • 20344362166 scopus 로고    scopus 로고
    • G. Xu, L. Iftode, Locality driven key management architecture for mobile ad-hoc networks, in: Proceedings for the 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004.
  • 15
    • 84883869163 scopus 로고    scopus 로고
    • H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02), 2002, pp. 567-574.
  • 16
    • 0035704362 scopus 로고    scopus 로고
    • J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad hoc networks, in: Proceedings of the 9th International Conference on Network Protocols (ICNP), 2001, pp. 251-260.
  • 17
    • 34548851762 scopus 로고    scopus 로고
    • S. Chokhani, W. Ford, R. Sabett, C. Merrill, Internet X.509 public key infrastructure certificate policy and certification practices framework, Internet Request for Comments (RFC 3647), November 2003.
  • 20
    • 0035789229 scopus 로고    scopus 로고
    • J.-P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), 2001, pp. 146-155.
  • 21
    • 34548847222 scopus 로고    scopus 로고
    • R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, Internet Request for Comments (RFC 3280), April 2002.
  • 22
    • 34548854297 scopus 로고    scopus 로고
    • M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 internet public key infrastructure online certificate status protocol - OCSP, Internet Request for Comments (RFC 2560), June 1999.
  • 23
    • 0034590150 scopus 로고    scopus 로고
    • L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, 2000, pp. 1268-1273.
  • 24
    • 4544255199 scopus 로고    scopus 로고
    • A. Weimerskirch, D. Westhoff, Identity certified authentication for ad-hoc networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN'03), 2003, pp. 33-40.
  • 25
    • 4544385707 scopus 로고    scopus 로고
    • T.S. Messerges, J. Cukier, T.A.M. Kevenaar, L. Puhl, R. Struik, E. Callaway, A security design for a general purpose, self-organizing, multihop ad hoc wireless network, in: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 1-11.
  • 26
    • 21644442546 scopus 로고    scopus 로고
    • S.L. Keoh, E. Lupu, M. Sloman, PEACE: a policy-based establishment of ad-hoc communities, in: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004, pp. 386-395.
  • 27
    • 77953755238 scopus 로고    scopus 로고
    • M.C. Morogan, S. Muftic, Certificate management in ad hoc networks, in: Symposium on Applications and the Internet Workshops (SAINT 2003), 2003, pp. 337-341.
  • 28
    • 34548826013 scopus 로고    scopus 로고
    • R.R.S. Verma, D. O'Mahony, H. Tewari, Progressive authentication in ad hoc networks, in: Proceedings of the Fifth European Wireless Conference, 2004.
  • 29
    • 0036999160 scopus 로고    scopus 로고
    • C. Candolin, H. Kari, A security architecture for wireless ad hoc networks, in: Proceedings of IEEE Milcom 2002, 2002.
  • 30
    • 4544374484 scopus 로고    scopus 로고
    • C. Crépeau, C.R. Davis, A certificate revocation scheme for wireless ad hoc networks, in: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), 2003, pp. 54-61.
  • 31
    • 34548855403 scopus 로고    scopus 로고
    • C.R. Davis, A localized trust management scheme for ad hoc networks, in: 3rd International Conference on Networking (ICN'04), 2004, pp. 671-675.
  • 32
    • 0242696192 scopus 로고    scopus 로고
    • S. Buchegger, J. Le Boudec, Performance analysis of the CONFIDANT protocol, in: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc'02), 2002, pp. 226-236.
  • 34
    • 3042714261 scopus 로고    scopus 로고
    • J. Schneider, G. Kortuem, J. Jager, S. Fickas, Z. Segall, Disseminating trust information in wearable communities, in: Proceedings of 2nd International Symposium on Handheld and Ubitquitous Computing, 2000.
  • 35
    • 34548825166 scopus 로고    scopus 로고
    • L. Page, S. Brin, R. Motwani, T. Winograd, The pagerank citation ranking: bringing order to the web, in: 7th International World Wide Web Conference (WWW Consortium), 1998, pp. 161-172.
  • 36
    • 84880467894 scopus 로고    scopus 로고
    • S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in: Proceedings of the Twelfth International World Wide Web Conference, 2003.
  • 37
    • 84944078503 scopus 로고    scopus 로고
    • L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: IEEE Conference on ECommerce (CEC'03), 2003, pp. 275-284.
  • 38
    • 0038717615 scopus 로고    scopus 로고
    • M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2003.
  • 39
    • 35248858458 scopus 로고    scopus 로고
    • C.Y. Liau, X. Zhou, S. Bressan, K.-L. Tan, Efficient distributed reputation scheme for peer-to-peer systems, in: Proceedings of the 2nd International Human.Society@Internet, 2003, pp. 54-63.
  • 40
    • 34548852259 scopus 로고    scopus 로고
    • T.D. Huynh, N.R. Jennings, N.R. Shadbolt, Fire: an integrated trust and reputation model for open multi-agent systems, in: Proceedings of the 16th European Conference on Artificial Intelligence (ECAI), 2004, pp. 18-20.
  • 41
    • 84974678544 scopus 로고    scopus 로고
    • B. Yu, M.P. Singh, A social mechanism of reputation management in electronic communities, in: Proceedings of the 4th International Workshop on Cooperative Information Agents, 2000, pp. 154-165.
  • 42
    • 85094162508 scopus 로고    scopus 로고
    • A. Abdul-Rahman, S. Hailes, Supporting trust in virtual communities, in: Proceedings of Hawaii International Conference on System Sciences HICSS, 2000.
  • 43
    • 0035747559 scopus 로고    scopus 로고
    • K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in: Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01), 2001, pp. 310-317.
  • 44
    • 34548827392 scopus 로고    scopus 로고
    • Q. Zhang, T. Yu, K. Irwin, A classification scheme for trust functions in reputation-based trust management, in: Proceedings of ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004.
  • 45
    • 29844454971 scopus 로고    scopus 로고
    • J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, M. Gerla, A secure ad-hoc routing approach using localized self-healing communities, in: Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc'05), 2005, pp. 254-265.
  • 46
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 24 11 (1981) 770-772
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 47
    • 34548839673 scopus 로고    scopus 로고
    • N.I. of Standards, Technology, Secure hash standard, Federal Information Processing Standards Publications (FIPS PUBS) 180-1, April 1995.
  • 48
    • 34548839162 scopus 로고    scopus 로고
    • R.L. Rivest, The md5 message-digest algorithm, Internet Request for Comments (RFC 1321), April 1992.
  • 49
    • 34548857683 scopus 로고    scopus 로고
    • H. Krawczyk, M. Bellare, R. Canetti, Hmac: Keyed-hashing for message authentication, Internet Request for Comments (RFC 2104), February 1997.
  • 51
    • 4544258840 scopus 로고    scopus 로고
    • Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), 2003, pp. 135-147.
  • 52
    • 4143084830 scopus 로고    scopus 로고
    • H. Deng, Q.-A. Zeng, D.P. Agrawal, Svm-based intrusion detection system for wireless ad hoc networks, in: Proceedings of the IEEE 58th Vehicular Technology Conference (VTC 2003-Fall), 2003, pp. 2147-2151.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.