Ieee Infocom 2004
DOI: 10.1109/infcom.2004.1354661
|View full text |Cite
|
Sign up to set email alerts
|

A cluster-based security architecture for ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
83
0
3

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 140 publications
(86 citation statements)
references
References 11 publications
0
83
0
3
Order By: Relevance
“…Dong et al [10] and Bechler et al [4] propose the distribution of the CA service by using threshold cryptography and introduce the cluster structure. The cluster concept is adopted to provide the CA service and proactive secret shared update protocol.…”
Section: A Certification Authority In Manetmentioning
confidence: 99%
See 1 more Smart Citation
“…Dong et al [10] and Bechler et al [4] propose the distribution of the CA service by using threshold cryptography and introduce the cluster structure. The cluster concept is adopted to provide the CA service and proactive secret shared update protocol.…”
Section: A Certification Authority In Manetmentioning
confidence: 99%
“…The cluster concept is adopted to provide the CA service and proactive secret shared update protocol. In Bechler et al's [4] approach, the certification of any guest node must possess a certain number (W ) of warranty certificates from warrantor nodes. Then, it must request at least (k) certificates from different cluster heads (CHs), whose association gives the network certificate.…”
Section: A Certification Authority In Manetmentioning
confidence: 99%
“…Clusters have also been applied in recent research on distributing trust authorities in ad hoc networks [1], [2].…”
Section: Overlays and Clusters As A Structuring Mechanism For Informamentioning
confidence: 99%
“…Recent research has investigated the issue of establishing a PKI on a subset of nodes in the network [1], [2] based on the use of cluster algorithms for the determination of cluster heads. Simultaneously, numerous authors have focused on the propagation of trust and developed models for establishing trust in MANETs [3], [4], [5], [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, an ad hoc network is extremely dynamic as its nodes are able to join or leave the network at any time [1,5]. Moreover, the deployment of security mechanism in an ad hoc network is a challenging issue because of its above inherent characteristics.…”
Section: Introductionmentioning
confidence: 99%