HKUST Library Institutional Repository Banner

HKUST Institutional Repository >
Computer Science and Engineering >
CSE Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/1783.1/6706
Title: Secure autoconfiguration and public-key distribution for mobile ad-hoc networks
Authors: Zhou, Hongbo
Mutak, Matt W.
Ni, Lionel M.
Keywords: Autoconflguration
Public key distribution
MANET
Security
Issue Date: Oct-2009
Citation: Proceedings IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS'09, 12-15 October 2009, Macau, China, p. 256-263
Abstract: Security is extremely important for the deployment of a Mobile Ad-hoc Networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However, the importance of integration of a secure autoconfiguration and public-key distribution has been neglected. This paper presents a secure autoconfiguration and public-key distribution algorithm to achieve uniqueness of address allocation and secure public-key distribution when a new node joins a MANET, which provides the bootstrapping for building a distributed certificate authority (DCA) in the network where a trust relationship is absent.
Rights: © 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
URI: http://hdl.handle.net/1783.1/6706
Appears in Collections:CSE Conference Papers

Files in This Item:

File Description SizeFormat
secure.pdf2091KbAdobe PDFView/Open

All items in this Repository are protected by copyright, with all rights reserved.