Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 245 |
---|---|
container_issue | |
container_start_page | 232 |
container_title | |
container_volume | 3093 |
creator | Zouridaki, Charikleia Mark, Brian L. Gaj, Kris Thomas, Roshan K. |
description | The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size. |
doi_str_mv | 10.1007/978-3-540-25980-0_19 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_15993386</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3087599_25_243</sourcerecordid><originalsourceid>FETCH-LOGICAL-j338t-2517422807264e4d8bc187969bfb535816990c9cc62e350966f573ea845a0d333</originalsourceid><addsrcrecordid>eNpFkE9PGzEQxQ2lqFHIN-jBlx7d2h7_PUbbtKBC4UDOltfxhoVtdms7oHz7OoBUX8Z6896M5ofQZ0a_Mkr1N6sNASIFJVxaQwl1zJ6gRZWhiq8aPUUzphgjAMJ--N_jnCk4QzMKlBOrBZyjma0WbSWwT2iR8yOtjwMVQs_Q-nufS-rbfYkb3CxJ63P93P26wt2Y8M3Y9kPEyw2-HAP-HcvLmJ4yXud-t8WrYein0gfc7NNzxE06TGXcJj89HC7Qx84POS7e6xytf6zum0tyffvzqllek0cAU-pxTAvODdVciSg2pg3MaKts27USpGHKWhpsCIpHkNQq1UkN0RshPd0AwBx9eZs7-Rz80CW_C312U-r_-HRwTFpbF6nq42--XFu7bUyuHcen7FgFW3m7Cs-Bq_jcK1t35F1D8D48jX_3MRcXj6kQdyX5ITz4qcSUHVCj656adFwA_AM0O3sY</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3087599_25_243</pqid></control><display><type>book_chapter</type><title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</title><source>Springer Books</source><creator>Zouridaki, Charikleia ; Mark, Brian L. ; Gaj, Kris ; Thomas, Roshan K.</creator><contributor>Katsikas, Sokratis K ; Gritzalis, Stefanos ; Gritzalis, Stefanos ; López, Javier ; Katsikas, Sokratis K.</contributor><creatorcontrib>Zouridaki, Charikleia ; Mark, Brian L. ; Gaj, Kris ; Thomas, Roshan K. ; Katsikas, Sokratis K ; Gritzalis, Stefanos ; Gritzalis, Stefanos ; López, Javier ; Katsikas, Sokratis K.</creatorcontrib><description>The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540222163</identifier><identifier>ISBN: 3540222162</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540259800</identifier><identifier>EISBN: 3540259805</identifier><identifier>DOI: 10.1007/978-3-540-25980-0_19</identifier><identifier>OCLC: 934979531</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; cluster ; Cryptography ; elliptic curve cryptography ; Exact sciences and technology ; Information, signal and communications theory ; mobile ad hoc network ; scalability ; Signal and communications theory ; Telecommunications and information theory ; threshold cryptography</subject><ispartof>Lecture notes in computer science, 2004, Vol.3093, p.232-245</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2004 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3087599-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-25980-0_19$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-25980-0_19$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=15993386$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Katsikas, Sokratis K</contributor><contributor>Gritzalis, Stefanos</contributor><contributor>Gritzalis, Stefanos</contributor><contributor>López, Javier</contributor><contributor>Katsikas, Sokratis K.</contributor><creatorcontrib>Zouridaki, Charikleia</creatorcontrib><creatorcontrib>Mark, Brian L.</creatorcontrib><creatorcontrib>Gaj, Kris</creatorcontrib><creatorcontrib>Thomas, Roshan K.</creatorcontrib><title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</title><title>Lecture notes in computer science</title><description>The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.</description><subject>Applied sciences</subject><subject>cluster</subject><subject>Cryptography</subject><subject>elliptic curve cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>mobile ad hoc network</subject><subject>scalability</subject><subject>Signal and communications theory</subject><subject>Telecommunications and information theory</subject><subject>threshold cryptography</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540222163</isbn><isbn>3540222162</isbn><isbn>9783540259800</isbn><isbn>3540259805</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2004</creationdate><recordtype>book_chapter</recordtype><recordid>eNpFkE9PGzEQxQ2lqFHIN-jBlx7d2h7_PUbbtKBC4UDOltfxhoVtdms7oHz7OoBUX8Z6896M5ofQZ0a_Mkr1N6sNASIFJVxaQwl1zJ6gRZWhiq8aPUUzphgjAMJ--N_jnCk4QzMKlBOrBZyjma0WbSWwT2iR8yOtjwMVQs_Q-nufS-rbfYkb3CxJ63P93P26wt2Y8M3Y9kPEyw2-HAP-HcvLmJ4yXud-t8WrYein0gfc7NNzxE06TGXcJj89HC7Qx84POS7e6xytf6zum0tyffvzqllek0cAU-pxTAvODdVciSg2pg3MaKts27USpGHKWhpsCIpHkNQq1UkN0RshPd0AwBx9eZs7-Rz80CW_C312U-r_-HRwTFpbF6nq42--XFu7bUyuHcen7FgFW3m7Cs-Bq_jcK1t35F1D8D48jX_3MRcXj6kQdyX5ITz4qcSUHVCj656adFwA_AM0O3sY</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Zouridaki, Charikleia</creator><creator>Mark, Brian L.</creator><creator>Gaj, Kris</creator><creator>Thomas, Roshan K.</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</title><author>Zouridaki, Charikleia ; Mark, Brian L. ; Gaj, Kris ; Thomas, Roshan K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j338t-2517422807264e4d8bc187969bfb535816990c9cc62e350966f573ea845a0d333</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>cluster</topic><topic>Cryptography</topic><topic>elliptic curve cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>mobile ad hoc network</topic><topic>scalability</topic><topic>Signal and communications theory</topic><topic>Telecommunications and information theory</topic><topic>threshold cryptography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zouridaki, Charikleia</creatorcontrib><creatorcontrib>Mark, Brian L.</creatorcontrib><creatorcontrib>Gaj, Kris</creatorcontrib><creatorcontrib>Thomas, Roshan K.</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zouridaki, Charikleia</au><au>Mark, Brian L.</au><au>Gaj, Kris</au><au>Thomas, Roshan K.</au><au>Katsikas, Sokratis K</au><au>Gritzalis, Stefanos</au><au>Gritzalis, Stefanos</au><au>López, Javier</au><au>Katsikas, Sokratis K.</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</atitle><btitle>Lecture notes in computer science</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3093</volume><spage>232</spage><epage>245</epage><pages>232-245</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540222163</isbn><isbn>3540222162</isbn><eisbn>9783540259800</eisbn><eisbn>3540259805</eisbn><abstract>The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/978-3-540-25980-0_19</doi><oclcid>934979531</oclcid><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2004, Vol.3093, p.232-245 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_15993386 |
source | Springer Books |
subjects | Applied sciences cluster Cryptography elliptic curve cryptography Exact sciences and technology Information, signal and communications theory mobile ad hoc network scalability Signal and communications theory Telecommunications and information theory threshold cryptography |
title | Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T15%3A28%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Distributed%20CA-based%20PKI%20for%20Mobile%20Ad%20Hoc%20Networks%20Using%20Elliptic%20Curve%20Cryptography&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Zouridaki,%20Charikleia&rft.date=2004&rft.volume=3093&rft.spage=232&rft.epage=245&rft.pages=232-245&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540222163&rft.isbn_list=3540222162&rft_id=info:doi/10.1007/978-3-540-25980-0_19&rft_dat=%3Cproquest_pasca%3EEBC3087599_25_243%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540259800&rft.eisbn_list=3540259805&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3087599_25_243&rft_id=info:pmid/&rfr_iscdi=true |