Filters








2,515 Hits in 8.6 sec

A survey on peer-to-peer key management for mobile ad hoc networks

Johann Van Der Merwe, Dawoud Dawoud, Stephen McDonald
2007 ACM Computing Surveys  
-peer key management, pairwise key management ACM Reference Format: van der Merwe, J., Dawoud, D., and McDonald, S. 2007. A survey on peer-to-peer key management for mobile ad hoc networks.  ...  The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs).  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their insightful comments and suggestions.  ... 
doi:10.1145/1216370.1216371 fatcat:rcauxrgg7vgurhyibno5cqms6m

Security considerations in ad hoc sensor networks

Fei Hu, Neeraj K. Sharma
2005 Ad hoc networks  
This paper analyzes security challenges in wireless sensor networks and summarizes key issues that need be solved for achieving security in an ad hoc network.  ...  In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena.  ...  State-of-the-art Currently there are some key management schemes that can be partially used for securing ASN environments even though most of those schemes are proposed for general ad hoc networks. • Hybrid  ... 
doi:10.1016/j.adhoc.2003.09.009 fatcat:kiutsu2bvbgcfehtniqdwjbmdm

A Design Approach for Wireless Communication Security in Bluetooth Network

V. Sujatha, Anuradha Anumolu, Debnath Bhattacharyya, Tai-hoon Kim
2014 International Journal of Security and Its Applications  
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections.  ...  It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency.  ...  To applications such as large ad hoc networks and outside interconnection access, high level security schemes should preferably be enforced for complementation.  ... 
doi:10.14257/ijsia.2014.8.2.35 fatcat:csbqfltz7fc4bfek7xju2zte5q

Spontaneous Ad Hoc Mobile Cloud Computing Network

Raquel Lacuesta, Jaime Lloret, Sandra Sendra, Lourdes Peñalver
2014 The Scientific World Journal  
For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network.  ...  In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network.  ...  If we want to create a spontaneous ad hoc network for mobile cloud computing, we need trust establishment, key management, and membership control.  ... 
doi:10.1155/2014/232419 pmid:25202715 pmcid:PMC4151486 fatcat:uczjwx6cwve5hepy2n6e3aogoa

Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks

Janani V S, Manikandan M S K
2018 EURASIP Journal on Wireless Communications and Networking  
In mobile ad hoc networks (MANETs), the reliability of nodes, quality of data and access control cannot be achieved successfully for various network functionalities through traditional cryptographic security  ...  Therefore, it is of great importance that efficient trust management mechanisms should be developed in a public key infrastructure (PKI), in order to verify the identities on the ad hoc networks for reliable  ...  Acknowledgements The authors would like to thank the Computer Network Laboratory of Thiagarajar College of Engineering for the support in the development and simulation of the concept.  ... 
doi:10.1186/s13638-017-1001-5 fatcat:ypjrkrfbprbhxf6pumcqolpwci

Connecting the worlds: Multipoint videoconferencing integrating H.323 and IPv4, SIP and IPv6 with autonomous sender authentication

Hans L. Cycon, Gabriel Hege, Detlev Marpe, Mark Palkow, Thomas C. Schmidt, Matthias Wahlisch
2009 2009 IEEE 13th International Symposium on Consumer Electronics  
network.  ...  Built upon an underlying peer-to-peer communication scheme, it further supports advanced integration with legacy MCUs and thereby enables hybrid sessions that extend into the H.323 world.  ...  The daViKo system operates in ad hoc mode and relies on the latter scheme that allows for personal identification of a callee.  ... 
doi:10.1109/isce.2009.5157038 fatcat:rlqjt7jpcfagdaqcaeulvg4lku

Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis

Deepti Joshi, Kamesh Namuduri, Ravi Pendse
2005 EURASIP Journal on Wireless Communications and Networking  
This paper proposes a modification to the existing "fully distributed certificate authority" scheme for ad hoc networks.  ...  Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure.  ...  Aparna Nagesh for performing the simulations required for the plots.  ... 
doi:10.1155/wcn.2005.579 fatcat:7m2ix5mhxzenpe64xddomhusj4

Enhanced Ring Signatures Schemes for Privacy Preservation in Wireless Sensor Networks

Sarthak Mishra, Manjusha Pandey
2014 International Journal of Modern Education and Computer Science  
As the application of the wireless sensor network is increasing, there is an emerging need for the security and privacy scheme which makes the network secure from various attacks and hide the ongoing activities  ...  Each of the schemes induce some overhead in the network. A light weight scheme is always desired for resource constraint wireless sensor networks.  ...  which are now-adays very popularly known as ad-hoc groups. ad-hoc group are highly dynamic in nature so it creates new challenges for net-working and its security.  ... 
doi:10.5815/ijmecs.2014.11.08 fatcat:obzjek6xhbeildmx76kkibrmqa

Detection and Prevention of Black Hole Attack in MANET

2016 International Journal of Scientific Research and Management  
Such nodes are selected and blackhole attack is launched targeting them, thereby damaging more number of paths in a single attempt.Further, the attacker selects only those genuine nodes through more than  ...  Broadly speaking, in the proposed blackhole attack, the attacker looks for nodes through which many alternative paths of multipath AODV passes through.  ...  Related Work The problem of security and cooperation enforcement has received considerable attention by researchers in the ad hoc network community.  ... 
doi:10.18535/ijsrm/v4i9.07 fatcat:zzt65smm5jf3deb54lzcijzo5q

Hybrid Broadcast Encryption and Group Key Agreement Protocol with Precise Cipher Texts

Chinnala Balakrishna, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The purpose of Group Key Accord (GKAP) protocol is for negotiate all the assembly members and designing a familiar encryption key through the network.  ...  In cryptographic system so as to manage the group of members, the group key management protocol is used and it also should provide the security to the group of members which means the communication among  ...  The new computational tools are like instant messaging, group-oriented communications, social media and mobile ad hoc networks. These novel schemes are said to be cryptographic techniques.  ... 
doi:10.17762/turcomat.v12i5.1742 fatcat:s544zvkx2beq5oidpxwsm6j64q

DESIGN, IMPLEMENTATION, AND EVALUATION OF BLUETOOTH SECURITY

JUN-ZHAO SUN, DOUGLAS HOWIE, ANTTI KOIVISTO, JAAKKO SAUVOLA
2001 Wireless LANs and Home Networks  
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections.  ...  Then both link-level and service-level security schemes are discussed in detail on the basis of the framework.  ...  To applications such as large ad hoc networks and outside interconnection access, high level security schemes should preferably be enforced for complementation. Examples include e.g.  ... 
doi:10.1142/9789812799562_0012 fatcat:wyyw4os3cnebdmmnxyc45zp33i

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona [chapter]

Birgitta König-Ries, Kia Makki, S.A.M. Makki, Charles E. Perkins, Niki Pissinou, Peter Reiher, Peter Scheuermann, Jari Veijalainen, Alexander Wolf, Ouri Wolfson
2002 Lecture Notes in Computer Science  
This problem cannot be avoided, because the signals must propagate in all directions from the base stations, terminals, and communicating components of mobile ad hoc networks (MANETs) that support mobility  ...  The improved WEP no longer has a shared key for the packets; instead it now has a unique key for every packet.  ...  For example, there is work on different management protocols for ad hoc management (ANMP), and work on making ad hoc networks fault tolerant.  ... 
doi:10.1007/3-540-36257-6_1 fatcat:pfj5sa4ahzbv3gso3ex4ajerl4

Personal Privacy in Mobile Networks [chapter]

Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
2011 Mobile Technologies for Conflict Management  
It finally presents several solutions for the protection of location privacy in different setting and mobile networks.  ...  This scenario results in a renewed interest in solutions for protecting the privacy of mobile users, especially in those environments where lack of protection may result in persecution, political violence  ...  Capkun et al. provide a scheme for secure and privacypreserving communications in hybrid ad-hoc networks (Capkun et al. 2004) .  ... 
doi:10.1007/978-94-007-1384-0_14 fatcat:d77oitt6xrg3jcqexrcvfesadi

Distributed SIP conference management with autonomously authenticated sources and its application to an H.264 videoconferencing software for mobiles

Thomas C. Schmidt, Gabriel Hege, Matthias Wählisch, Hans L. Cycon, Mark Palkow, Detlev Marpe
2010 Multimedia tools and applications  
We describe the essential building blocks for conference management and media distribution that are necessary for a distributed conferencing approach.  ...  The design of conferencing systems for achieving efficient and flexible communication in a fully distributed, infrastructure-independent fashion is a promising direction, both in terms of research and  ...  This paper deals with the question how to enable infrastructure-agnostic ad hoc videoconferencing in a standard-compliant and secure manner by involving both standard PCs and mobile devices.  ... 
doi:10.1007/s11042-010-0500-8 fatcat:7cqg25go5baqnimas2gt2dkz3u

Efficient Multilevel Privacy Preserving Authentication Scheme for Emergency Message Communication in VANE

G Santhana Devi, M Germanus Alex
2018 International Journal of Engineering & Technology  
Vehicular ad hoc networks (VANETs) provide spontaneous traffic related and emergency rescue messages to its users of the route thereby enable them with the trouble-free driving.  ...  In the proposed scheme the TA provides a long term Verification signature which is mandatory to all the vehicles that are registered under VANET and this signature is also necessary in receiving the secondary  ...  Vehicular ad-hoc network provides an ideal transportation system to the world. It is one of the secondary divisions of mobile ad-hoc network.  ... 
doi:10.14419/ijet.v7i3.6.14973 fatcat:wwvonwcor5abjpfb2dh33u55uu
« Previous Showing results 1 — 15 out of 2,515 results