2010
DOI: 10.1109/twc.2010.080610.090759
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cluster-Based Ad Hoc Networks with Distributed Authorities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(19 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…Our schemes work securely and properly on the assumption, which is similar to assumptions made in [12][13][14], that adversaries compromise no more than ( − 1) out of CHs in a given time period. In practice, it is hard to compromise, in a given time period, CHs, which are more secure and powerful than common nodes and are geographically distributed over a wide area.…”
Section: Network Architecturementioning
confidence: 98%
“…Our schemes work securely and properly on the assumption, which is similar to assumptions made in [12][13][14], that adversaries compromise no more than ( − 1) out of CHs in a given time period. In practice, it is hard to compromise, in a given time period, CHs, which are more secure and powerful than common nodes and are geographically distributed over a wide area.…”
Section: Network Architecturementioning
confidence: 98%
“…Fully distributed ID based Multiple Secret Keys Management (IMKM) [52] scheme is used for securing clustered ad-hoc networks. The IMKM uses ID based multiple secrets and threshold cryptography to eliminate the need of certificate based authentication public key distribution.…”
Section: Manetmentioning
confidence: 99%
“…The adversary node can intercept any information in the network. In a certain period, we allow there are t-1 compromised nodes in our network under t>n/2 condition [13]. Table 1 presents some necessary annotations.…”
Section: Assumptionmentioning
confidence: 99%