Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography

The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zouridaki, Charikleia, Mark, Brian L., Gaj, Kris, Thomas, Roshan K.
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 245
container_issue
container_start_page 232
container_title
container_volume 3093
creator Zouridaki, Charikleia
Mark, Brian L.
Gaj, Kris
Thomas, Roshan K.
description The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.
doi_str_mv 10.1007/978-3-540-25980-0_19
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_15993386</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3087599_25_243</sourcerecordid><originalsourceid>FETCH-LOGICAL-j338t-2517422807264e4d8bc187969bfb535816990c9cc62e350966f573ea845a0d333</originalsourceid><addsrcrecordid>eNpFkE9PGzEQxQ2lqFHIN-jBlx7d2h7_PUbbtKBC4UDOltfxhoVtdms7oHz7OoBUX8Z6896M5ofQZ0a_Mkr1N6sNASIFJVxaQwl1zJ6gRZWhiq8aPUUzphgjAMJ--N_jnCk4QzMKlBOrBZyjma0WbSWwT2iR8yOtjwMVQs_Q-nufS-rbfYkb3CxJ63P93P26wt2Y8M3Y9kPEyw2-HAP-HcvLmJ4yXud-t8WrYein0gfc7NNzxE06TGXcJj89HC7Qx84POS7e6xytf6zum0tyffvzqllek0cAU-pxTAvODdVciSg2pg3MaKts27USpGHKWhpsCIpHkNQq1UkN0RshPd0AwBx9eZs7-Rz80CW_C312U-r_-HRwTFpbF6nq42--XFu7bUyuHcen7FgFW3m7Cs-Bq_jcK1t35F1D8D48jX_3MRcXj6kQdyX5ITz4qcSUHVCj656adFwA_AM0O3sY</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3087599_25_243</pqid></control><display><type>book_chapter</type><title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</title><source>Springer Books</source><creator>Zouridaki, Charikleia ; Mark, Brian L. ; Gaj, Kris ; Thomas, Roshan K.</creator><contributor>Katsikas, Sokratis K ; Gritzalis, Stefanos ; Gritzalis, Stefanos ; López, Javier ; Katsikas, Sokratis K.</contributor><creatorcontrib>Zouridaki, Charikleia ; Mark, Brian L. ; Gaj, Kris ; Thomas, Roshan K. ; Katsikas, Sokratis K ; Gritzalis, Stefanos ; Gritzalis, Stefanos ; López, Javier ; Katsikas, Sokratis K.</creatorcontrib><description>The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540222163</identifier><identifier>ISBN: 3540222162</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540259800</identifier><identifier>EISBN: 3540259805</identifier><identifier>DOI: 10.1007/978-3-540-25980-0_19</identifier><identifier>OCLC: 934979531</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; cluster ; Cryptography ; elliptic curve cryptography ; Exact sciences and technology ; Information, signal and communications theory ; mobile ad hoc network ; scalability ; Signal and communications theory ; Telecommunications and information theory ; threshold cryptography</subject><ispartof>Lecture notes in computer science, 2004, Vol.3093, p.232-245</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2004 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3087599-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-25980-0_19$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-25980-0_19$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=15993386$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Katsikas, Sokratis K</contributor><contributor>Gritzalis, Stefanos</contributor><contributor>Gritzalis, Stefanos</contributor><contributor>López, Javier</contributor><contributor>Katsikas, Sokratis K.</contributor><creatorcontrib>Zouridaki, Charikleia</creatorcontrib><creatorcontrib>Mark, Brian L.</creatorcontrib><creatorcontrib>Gaj, Kris</creatorcontrib><creatorcontrib>Thomas, Roshan K.</creatorcontrib><title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</title><title>Lecture notes in computer science</title><description>The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.</description><subject>Applied sciences</subject><subject>cluster</subject><subject>Cryptography</subject><subject>elliptic curve cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>mobile ad hoc network</subject><subject>scalability</subject><subject>Signal and communications theory</subject><subject>Telecommunications and information theory</subject><subject>threshold cryptography</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540222163</isbn><isbn>3540222162</isbn><isbn>9783540259800</isbn><isbn>3540259805</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2004</creationdate><recordtype>book_chapter</recordtype><recordid>eNpFkE9PGzEQxQ2lqFHIN-jBlx7d2h7_PUbbtKBC4UDOltfxhoVtdms7oHz7OoBUX8Z6896M5ofQZ0a_Mkr1N6sNASIFJVxaQwl1zJ6gRZWhiq8aPUUzphgjAMJ--N_jnCk4QzMKlBOrBZyjma0WbSWwT2iR8yOtjwMVQs_Q-nufS-rbfYkb3CxJ63P93P26wt2Y8M3Y9kPEyw2-HAP-HcvLmJ4yXud-t8WrYein0gfc7NNzxE06TGXcJj89HC7Qx84POS7e6xytf6zum0tyffvzqllek0cAU-pxTAvODdVciSg2pg3MaKts27USpGHKWhpsCIpHkNQq1UkN0RshPd0AwBx9eZs7-Rz80CW_C312U-r_-HRwTFpbF6nq42--XFu7bUyuHcen7FgFW3m7Cs-Bq_jcK1t35F1D8D48jX_3MRcXj6kQdyX5ITz4qcSUHVCj656adFwA_AM0O3sY</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Zouridaki, Charikleia</creator><creator>Mark, Brian L.</creator><creator>Gaj, Kris</creator><creator>Thomas, Roshan K.</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</title><author>Zouridaki, Charikleia ; Mark, Brian L. ; Gaj, Kris ; Thomas, Roshan K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j338t-2517422807264e4d8bc187969bfb535816990c9cc62e350966f573ea845a0d333</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>cluster</topic><topic>Cryptography</topic><topic>elliptic curve cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>mobile ad hoc network</topic><topic>scalability</topic><topic>Signal and communications theory</topic><topic>Telecommunications and information theory</topic><topic>threshold cryptography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zouridaki, Charikleia</creatorcontrib><creatorcontrib>Mark, Brian L.</creatorcontrib><creatorcontrib>Gaj, Kris</creatorcontrib><creatorcontrib>Thomas, Roshan K.</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zouridaki, Charikleia</au><au>Mark, Brian L.</au><au>Gaj, Kris</au><au>Thomas, Roshan K.</au><au>Katsikas, Sokratis K</au><au>Gritzalis, Stefanos</au><au>Gritzalis, Stefanos</au><au>López, Javier</au><au>Katsikas, Sokratis K.</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography</atitle><btitle>Lecture notes in computer science</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3093</volume><spage>232</spage><epage>245</epage><pages>232-245</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540222163</isbn><isbn>3540222162</isbn><eisbn>9783540259800</eisbn><eisbn>3540259805</eisbn><abstract>The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve Cryptography (ECC) that overcomes these challenges. In this scheme, a relatively small number of mobile CA servers provide distributed service for the mobile nodes. The key elements of our approach include the use of threshold cryptography, cluster-based key management with mobile CA servers, and ECC. We show that the proposed scheme is resistant to a wide range of security attacks and can scale easily to networks of large size.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/978-3-540-25980-0_19</doi><oclcid>934979531</oclcid><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2004, Vol.3093, p.232-245
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_15993386
source Springer Books
subjects Applied sciences
cluster
Cryptography
elliptic curve cryptography
Exact sciences and technology
Information, signal and communications theory
mobile ad hoc network
scalability
Signal and communications theory
Telecommunications and information theory
threshold cryptography
title Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T15%3A28%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Distributed%20CA-based%20PKI%20for%20Mobile%20Ad%20Hoc%20Networks%20Using%20Elliptic%20Curve%20Cryptography&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Zouridaki,%20Charikleia&rft.date=2004&rft.volume=3093&rft.spage=232&rft.epage=245&rft.pages=232-245&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540222163&rft.isbn_list=3540222162&rft_id=info:doi/10.1007/978-3-540-25980-0_19&rft_dat=%3Cproquest_pasca%3EEBC3087599_25_243%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540259800&rft.eisbn_list=3540259805&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3087599_25_243&rft_id=info:pmid/&rfr_iscdi=true