2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
Download PDF

Abstract

Ad-hoc network - and in particular wireless mobile ad-hoc network - have unique characteristic and constraint that make traditional cryptographic mechanisms and assumptions inappropriate. In particular, it may not be warranted to assume pre-existing shared secrets between member of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represent an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for mall, resource-constrained devices. We propose to combine efficient technique from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc network. We also discuss the available mechanisms and their suitability for the proposed task.
Like what you’re reading?
Already a member?Sign In
Member Price
$11
Non-Member Price
$21
Add to CartSign In
Get this article FREE with a new membership!

Related Articles