We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case, the security protocol runs over one-hop radio links. We further show that mobility can be used for the periodic renewal of vital security information (...
Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. ...
Certain popular wireless sensor network applications, including disaster recovery, battlefield commu...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
MANETs (Mobile Ad hoc networks) are unplanned, self-organizing networks composed of mobile nodes tha...
Trust plays an important role in protecting the security of mobile ad hoc networks. The node mobilit...
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communic...
Mobile Adhoc Network(MANETs) is a collection of mobile nodes that communicate by forming a network d...
Conventional network protocols and its security mechanisms fail to cope with arising challenges in t...
Supporting the requirements of mobile networking is a very exciting and challenging task that has th...
In contrast with conventional networks, mobile ad hoc networks usually do not provide on-line access...
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject...
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes a...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. ...
Certain popular wireless sensor network applications, including disaster recovery, battlefield commu...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
MANETs (Mobile Ad hoc networks) are unplanned, self-organizing networks composed of mobile nodes tha...
Trust plays an important role in protecting the security of mobile ad hoc networks. The node mobilit...
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communic...
Mobile Adhoc Network(MANETs) is a collection of mobile nodes that communicate by forming a network d...
Conventional network protocols and its security mechanisms fail to cope with arising challenges in t...
Supporting the requirements of mobile networking is a very exciting and challenging task that has th...
In contrast with conventional networks, mobile ad hoc networks usually do not provide on-line access...
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject...
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes a...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. ...
Certain popular wireless sensor network applications, including disaster recovery, battlefield commu...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...