International audienceAd-hoc networks are subject to malicious attacks given their wireless nature and high dynamicity. Various security issues have been raised so far, especially access control. Our work focuses on a light and distributed AAA infrastructure that supports authentication and authorization. We make use of a distributed protocol based on the threshold cryptography theory, and the ISO 9798-3 authentication protocol standard. Access to the network is also controlled by an ACCESS TOKEN generated by the AAA service and referring to some Cryptographically Generated Addresse
Abstract- As various applications of wireless ad hoc network have been proposed, security has become...
Abstract — In this paper, we propose an architecture for providing distributed Certificate Authority...
With the more and more applications of MANET ("mobile ad-hoc networks") in civil and military field,...
International audienceAd-hoc networks are subject to malicious attacks given their wireless nature a...
International audienceAccess control AAA infrastructures are traditionally used by the service provi...
Abstract — Mobile hotspots, i.e. Internet access services in mov-ing networks (e.g. vehicular area n...
Abstract: Mobile ad hoc networks are growing in popularity due to the explosive growth of modern dev...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Ad hoc networks have lots of applications; however, a vital problem concerning their security aspect...
Starting with an efficient mobility management scheme for heterogeneous wireless networks, this pape...
International audienceIn previous work, we designed a distributed AAA framework for MANETs for which...
Converging networks and mobility raise new challenges towards the existing Authentication, Authorisa...
In this work we present a novel security architecture for MANETs that merges the clustering and the ...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract- As various applications of wireless ad hoc network have been proposed, security has become...
Abstract — In this paper, we propose an architecture for providing distributed Certificate Authority...
With the more and more applications of MANET ("mobile ad-hoc networks") in civil and military field,...
International audienceAd-hoc networks are subject to malicious attacks given their wireless nature a...
International audienceAccess control AAA infrastructures are traditionally used by the service provi...
Abstract — Mobile hotspots, i.e. Internet access services in mov-ing networks (e.g. vehicular area n...
Abstract: Mobile ad hoc networks are growing in popularity due to the explosive growth of modern dev...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Ad hoc networks have lots of applications; however, a vital problem concerning their security aspect...
Starting with an efficient mobility management scheme for heterogeneous wireless networks, this pape...
International audienceIn previous work, we designed a distributed AAA framework for MANETs for which...
Converging networks and mobility raise new challenges towards the existing Authentication, Authorisa...
In this work we present a novel security architecture for MANETs that merges the clustering and the ...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract- As various applications of wireless ad hoc network have been proposed, security has become...
Abstract — In this paper, we propose an architecture for providing distributed Certificate Authority...
With the more and more applications of MANET ("mobile ad-hoc networks") in civil and military field,...