## Abstract A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most se
Complex threshold key management for ad hoc network
โ Scribed by Guo Wei; Xiong Zhong-wei; Li Zhi-tang
- Publisher
- Wuhan University
- Year
- 2005
- Tongue
- English
- Weight
- 451 KB
- Volume
- 10
- Category
- Article
- ISSN
- 1007-1202
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
We encounter new types of security problems in ad hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and th
A group key agreement protocol allows a set of users to establish a common symmetric key via open networks. Dynamic asymmetric group key agreement means that a dynamic set of users form a temporary group and negotiate to share a public encryption key, so that anyone can send message securely and eff
Video streaming over wireless links is a challenging issue due to the stringent Qualityof-Service (QoS) requirements of video traffic, the limited wireless channel bandwidth and the broadcast nature of wireless medium. As contention-based or reservation-based (i.e., contention-free) medium access co
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non-interactively establish and update pairwise keys between nodes, is configurable to operate synchronously or asynchronous