International audienceIn this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metric, in order to select the clusterhead and to establish PKI in each cluster for authentication and exchange of data. Furthermore, we present new approach Dynamic Demilitarized Zone (DDMZ) to protect CA in each cluster. The principle idea of DDMZ consists to select the dispensable nodes, also called registration aut...
A Mobile Ad hoc Network (MANET) is receiving a great attention by different communities (e.g. milita...
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined infrastructu...
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limit...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
International audienceAn Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes...
International audienceTo avoid the single point of failure for the certificate authority (CA) in MAN...
In this work we present a novel security architecture for MANETs that merges the clustering and the ...
Mobile Adhoc Network(MANETs) is a collection of mobile nodes that communicate by forming a network d...
International audienceIn this paper, we propose a distributed and dynamic public key infrastructure ...
In this paper, we propose an architecture for providing distributed Certificate Authority (CA) servi...
International audienceIn this paper, we propose a secure and distributed public key infrastructure f...
International audienceProviding a security solution for mobile ad-hoc networks (MANETs) is not an ea...
International audienceIn this paper, we propose an anonymous protocol to secure nodes which have imp...
International audienceTo avoid the single point of failure for the certificate authority (CA) in MAN...
Secure communication in ad hoc networks is an inherent problem because of the distributiveness of th...
A Mobile Ad hoc Network (MANET) is receiving a great attention by different communities (e.g. milita...
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined infrastructu...
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limit...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
International audienceAn Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes...
International audienceTo avoid the single point of failure for the certificate authority (CA) in MAN...
In this work we present a novel security architecture for MANETs that merges the clustering and the ...
Mobile Adhoc Network(MANETs) is a collection of mobile nodes that communicate by forming a network d...
International audienceIn this paper, we propose a distributed and dynamic public key infrastructure ...
In this paper, we propose an architecture for providing distributed Certificate Authority (CA) servi...
International audienceIn this paper, we propose a secure and distributed public key infrastructure f...
International audienceProviding a security solution for mobile ad-hoc networks (MANETs) is not an ea...
International audienceIn this paper, we propose an anonymous protocol to secure nodes which have imp...
International audienceTo avoid the single point of failure for the certificate authority (CA) in MAN...
Secure communication in ad hoc networks is an inherent problem because of the distributiveness of th...
A Mobile Ad hoc Network (MANET) is receiving a great attention by different communities (e.g. milita...
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined infrastructu...
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limit...