2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
DOI: 10.1109/saintw.2003.1210182
|View full text |Cite
|
Sign up to set email alerts
|

Certificate management in ad hoc networks

Abstract: Various types of certificates are basic tools of modern cryptography and networks security. They are used in various protocols, in the form of public key identity certificates, binding a key to its owner or in the form of attribute certificates, being a proof of rights and capabilities of their owner. Management of certificates (creation, distribution, verification, and revocation) is dependent on a certification infrastructure comprising various certification authorities, protocols, and policies.In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Examples of these schemes include [23][24][25][26]. Other proposals such as [27,28] make the assumption that periodic access to on-line CAs is available; therefore CRLs can be obtained from the CAs. Then there are proposals such as [29] which make provision for certificate revocation, and do not assume that on-line CAs are accessible; but they do not provide protection against certificates being wrongfully revoked through malicious accusations.…”
Section: Related Workmentioning
confidence: 99%
“…Examples of these schemes include [23][24][25][26]. Other proposals such as [27,28] make the assumption that periodic access to on-line CAs is available; therefore CRLs can be obtained from the CAs. Then there are proposals such as [29] which make provision for certificate revocation, and do not assume that on-line CAs are accessible; but they do not provide protection against certificates being wrongfully revoked through malicious accusations.…”
Section: Related Workmentioning
confidence: 99%
“…Remark: There are other methods proposed in [3,4,11] which suggest that neighboring nodes can exchange information periodically in order to obtain the updated CRL. We believe that this may induce a longer delay than flooding in getting the latest information.…”
Section: Existing Workmentioning
confidence: 99%
“…Fortunately, security strategies [2], [4], [5], [8], [9], [11]with certificate management have been introduced to * Corresponding author counter against malicious attacks in MANETs in which each node must have a valid certificate from a trusted CA prior to joining the networks and any node cannot communicate with neighboring nodes without a valid certificate. The certificate can be easily validated because each node has the pubic key of the CA.…”
Section: Introductionmentioning
confidence: 99%