Filters








5 Hits in 4.1 sec

SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations [chapter]

Matija Pužar, Jon Andersson, Thomas Plagemann, Yves Roudier
2005 Lecture Notes in Computer Science  
This paper presents a simple and efficient key management protocol, called SKiMPy.  ...  Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations.  ...  for the emergency and rescue operations.  ... 
doi:10.1007/11601494_2 fatcat:frdjn4f4wnf5ri3mzeh547sdee

Manet key management via Mobile Ficlke Key protocol (MFK)

S Shahadan, K Farahah, A.F.A. Firdaus
2018 Journal of Fundamental and Applied Sciences  
SKiMPy protocol has been designed to send protected data with symmetric shared key in MANET.  ...  The protocol is tested on an ns performs better than SKiMPy in terms of both time delay and connectivity.  ...  This protocol can secure more in the transmission data for rescue and emergency network such as military, police, fire department and medical center that contain very sensitive data in MANET.  ... 
doi:10.4314/jfas.v9i5s.53 fatcat:6qvh4jzqjba4zfnikcmrhx4igy

Security and privacy issues in middleware for emergency and rescue applications

Matija Puzar, Thomas Plagemann, Yves Roudier
2008 2008 Second International Conference on Pervasive Computing Technologies for Healthcare  
In this thesis, we analyze in detail the requirements for usage of MANETs in emergency and rescue operations, with particular focus on security and data sharing.  ...  This is achieved by means of a simple and efficient key exchange protocol that relies on device credentials being installed prior to the operation.  ...  Acknowledgments This work has been performed in the Ad-Hoc InfoWare project and we would like to thank all project team members and related colleagues for many fruitful discussions and other contributions  ... 
doi:10.1109/pcthealth.2008.4571037 dblp:conf/ph/PuzarPR08 fatcat:xqkyel3klbeshcphmky7e5itku

A survey of key management in ad hoc networks

Anne Marie Hegland, Eli Winjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, Pal Spilling
2006 IEEE Communications Surveys and Tutorials  
The analysis puts some emphasis on their applicability in scenarios such as emergency and rescue operations, as this work was initiated by a study of security in MANETs for emergency and rescue operations  ...  The general assumption is that nodes in possession of a valid secret key can be trusted. Consequently, a secure and efficient key-management scheme is crucial.  ...  We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof.  ... 
doi:10.1109/comst.2006.253271 fatcat:zaobvvfiqzc2jovl7rozpplhxa

NEMAN: a network emulator for mobile ad-hoc networks

M. Puzar, T. Plagemann
2005 Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.  
NEMAN has shown to be an important and very useful tool during development of different applications and protocols for our project, including a key management protocol and a distributed event notification  ...  Development of applications and protocols for wireless ad-hoc networks has always been a challenge.  ...  ACKNOWLEDGMENTS This work has been performed in the Ad-Hoc InfoWare project and we would like to thank all project team members and related colleagues for many fruitful discussions and other contributions  ... 
doi:10.1109/contel.2005.185841 fatcat:o5t5lkzshjhs3elhzxwgkxk7mm