TY - GEN
T1 - Ubiquitous and secure certificate service for mobile Ad Hoc network
AU - Ge, Meng
AU - Lam, Kwok Yan
AU - Li, Jianbin
AU - Chung, Siu Leung
PY - 2008
Y1 - 2008
N2 - Mobile Ad Hoc Network (MANET) is suitable for providing a communication platform for resource sharing or instant messaging to people in public places where no communication infrastructure exists. Like many other applications of MANET, the application over the communication platform has non-trivial security requirements due to the unique features of MANET (e.g. the open nature of wireless links and absence of security infrastructure). As the basis of almost all security services, key management is essential for securing the applications. In this paper, we first propose a certificate-based key management scheme, the Ubiquitous and Secure Certificate Service (USCS) for MANET based on the Fully Distributed Certificate Authority (FDCA) approach. Compared with FDCA, the proposed USCS is more secure, however, the availability of the basic scheme is sacrificed to some extent. Therefore, an optimized USCS scheme is further proposed for our scenario. Through analysis and simulation, we show that the optimized USCS scheme not only can address the security issue, but also have availability as high as the FDCA approach in our scenario.
AB - Mobile Ad Hoc Network (MANET) is suitable for providing a communication platform for resource sharing or instant messaging to people in public places where no communication infrastructure exists. Like many other applications of MANET, the application over the communication platform has non-trivial security requirements due to the unique features of MANET (e.g. the open nature of wireless links and absence of security infrastructure). As the basis of almost all security services, key management is essential for securing the applications. In this paper, we first propose a certificate-based key management scheme, the Ubiquitous and Secure Certificate Service (USCS) for MANET based on the Fully Distributed Certificate Authority (FDCA) approach. Compared with FDCA, the proposed USCS is more secure, however, the availability of the basic scheme is sacrificed to some extent. Therefore, an optimized USCS scheme is further proposed for our scenario. Through analysis and simulation, we show that the optimized USCS scheme not only can address the security issue, but also have availability as high as the FDCA approach in our scenario.
UR - http://www.scopus.com/inward/record.url?scp=63149170637&partnerID=8YFLogxK
U2 - 10.1109/EUC.2008.91
DO - 10.1109/EUC.2008.91
M3 - Conference contribution
AN - SCOPUS:63149170637
SN - 9780769534923
T3 - Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
SP - 312
EP - 317
BT - Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
T2 - 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Y2 - 17 December 2008 through 20 December 2008
ER -