Affiliation:
1. Park University, USA
2. University of Missouri – Kansas City, USA
Abstract
Mobile ad hoc network is a network comprised of mobile nodes quickly forming an autonomous network for a particular purpose such as emergency search and rescue. One of the most prominent security challenges for such a network is the limited capacity in the mobile nodes, thereby preventing costly computation operations. However, this limitation on a mobile node manifests itself only when the mobile node is dispatched on an active duty (i.e., online). One can prepare the mobile nodes as much as possible offline in anticipation of an upcoming deployment. In this chapter, the authors present three offline/online authentication and key agreement schemes and one offline/online non-repudiation scheme, all aiming at fast online computation for mobile nodes in mobile ad hoc networks.
Reference45 articles.
1. Boonkrong, S., & Bradford, R. (2004). Authentication in mobile ad hoc networks. In Proceedings of the 1st Thailand Computer Science Conference (ThCSC), (pp. 202-207). ThCSC.
2. Algorithms for mobile ad hoc networks;A.Boukerche;Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks,2009
3. Self-organized public-key management for mobile ad hoc networks
4. Capkun, S., Hubaux, J.-P., & Buttyan, L. (2003). Mobility helps security in ad hoc networks. In Proceedings of the 4th ACM International Symposium on Mobile ad Hoc Networking & Computing (MobiHoc). ACM Press.
5. Mobility helps peer-to-peer security
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Radio Frequency Identification and Mobile Ad-Hoc Network;Handbook of Research on Recent Developments in Intelligent Communication Application;2017