First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
DOI: 10.1109/securecomm.2005.57
|View full text |Cite
|
Sign up to set email alerts
|

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks

Abstract: In this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide CA service, and design a scheme for locating CA server nodes in MANET; 2) we provide a proactive secret share update protocol, which periodically updates CA secret shares with low system overhead. Compared with existing approaches, our CA architecture provides… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(24 citation statements)
references
References 10 publications
0
24
0
Order By: Relevance
“…Dong et al [10] and Bechler et al [4] propose the distribution of the CA service by using threshold cryptography and introduce the cluster structure. The cluster concept is adopted to provide the CA service and proactive secret shared update protocol.…”
Section: A Certification Authority In Manetmentioning
confidence: 99%
See 1 more Smart Citation
“…Dong et al [10] and Bechler et al [4] propose the distribution of the CA service by using threshold cryptography and introduce the cluster structure. The cluster concept is adopted to provide the CA service and proactive secret shared update protocol.…”
Section: A Certification Authority In Manetmentioning
confidence: 99%
“…In classical Public Key Infrastructure (PKI) [9], a Registration Authority (RA) is used to collect and analyze users' requests before forwarding them to a CA to certify, issue and renew user's digital certificate. In Mobile Ad hoc Networks (MANETs), a decentralized certificate authority approach [6], [10], [23] is proposed, due to MANET characteristics, as a solution to avoid single point of failure, MANET attacks and consider nodes' mobility. To handle these requirements, a distributed clustering algorithm is proposed in [22] to cluster nodes based on a set of trusted nodes that belong to a confident community.…”
Section: Introductionmentioning
confidence: 99%
“…Note that such cryptosystems require the existence of a trusted certificate authority (CA) for initialization (issuance of keys and certificates) as well as revocation of users via a certificate revocation list (CRL). Several methods have been proposed for the distributed implementation of a CA [11,28,33]. Alternatively, methods based on symmetric keys can be used to protect critical messages [15,24,27].…”
Section: Network and Adversarial Modelsmentioning
confidence: 99%
“…The traditional security mechanism usually need a management center as the trust third party(TTP) to provide key man agement, authentication, access control, multicast group key management and other security services, while it's impractical for MANET. The function of the TTP is realized primarily in a distributed mode in MANET, and some elegant schemes [2][3][4][5][6][7][8] using secret sharing algorithm [I] are proposed with different implementations.…”
Section: Introductionmentioning
confidence: 99%
“…Dong [7] compares the security of partially and full distributed CA schemes according to the number of server nodes without mentioning how to decide the value of threshold in various environments. Ning [8] proposed a model to evaluate the security of the PKI for MANET, but didn't consider these two factors, too.…”
Section: Introductionmentioning
confidence: 99%