An authentication service is one of the the most fundamental building blocks for providing communication security. In this paper, we present the MOCA (MObile Certificate Authority) key management framework designed to provide authentication service for ad hoc wireless networks. MOCA is a distributed certificate authority (CA) based on threshold cryptography. We present a set of guidelines for a secure configuration of threshold cryptography to maintain strong security. MOCA utilizes a carefully selected set of mobile nodes to function as a collective certificate authority while the MOCA nodes are kept anonymous. Equipped with a novel routing protocol designed to support the unique communication pattern for certification traffic, MOCA achiev...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deploye...
Most prevalent Distributed Certificate Authority (DCA) schemes in the MANET are based upon threshold...
An authentication service is one of the the most fundamental building blocks for providing communica...
PKI has been recognized as one of the most effective tools for providing security for dynamic networ...
PKI has been recognized as one of the most successful and important tools for providing security for...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
Abstract Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessar...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — In this paper, we propose an architecture for providing distributed Certificate Authority...
A MANET is a collection of wireless mobile nodes dynamically forming a temporary network, without th...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deploye...
Most prevalent Distributed Certificate Authority (DCA) schemes in the MANET are based upon threshold...
An authentication service is one of the the most fundamental building blocks for providing communica...
PKI has been recognized as one of the most effective tools for providing security for dynamic networ...
PKI has been recognized as one of the most successful and important tools for providing security for...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
Abstract Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessar...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — In this paper, we propose an architecture for providing distributed Certificate Authority...
A MANET is a collection of wireless mobile nodes dynamically forming a temporary network, without th...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deploye...
Most prevalent Distributed Certificate Authority (DCA) schemes in the MANET are based upon threshold...