๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions

โœ Scribed by Giovanni Di Crescenzo; Renwei Ge; Gonzalo R. Arce


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
268 KB
Volume
5
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.

โœฆ Synopsis


Mobile Ad Hoc Networks (MANET), due to their lack of physical infrastructures or centralized online authorities, pose a number of security challenges to a protocol designer. In particular, several typical application scenarios demand the design of protocols that cannot base their security on the existence of trusted parties or setup information, but rather need to leverage uniquely on assumptions limiting the corrupting power of the adversaries. This naturally defines security design and analysis paradigms similar to those of the threshold cryptography area, where it is typically assumed that an adversary can corrupt up to a limited amount of entities or resources. Therefore a secure realization of primitives from threshold cryptography in MANET promises to be applicable to several MANET protocols. However, directly applying known threshold cryptography solutions for wired network into MANETs faces serious challenges. In particular, we noted a major design difficulty due to the lack of full network connectivity that significantly constrained the network topology assumptions under which a MANET threshold signature scheme can be proved secure. In this paper we formalize, investigate and present a new MANET threshold signature scheme that is secure under significantly improved topology and setup assumptions. Surprisingly, we break through an apparent barrier due to well-known results from the distributed computing area.


๐Ÿ“œ SIMILAR VOLUMES


Topology and mobility considerations in
โœ Brent Ishibashi; Raouf Boutaba ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 367 KB

A highly dynamic topology is a distinguishing feature and challenge of a mobile ad hoc network. Links between nodes are created and broken, as the nodes move within the network. This node mobility affects not only the source and/or destination, as in a conventional wireless network, but also interme

Minimizing spatial and time reservation
โœ Lubo Song; Chansu Yu ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 845 KB

Carrier sensing is widely adopted in wireless communication to protect data transfers from collisions. For example, distributed coordination function (DCF) in IEEE 802.11 standard renders a node to defer its communication if it senses the medium busy. For the duration of deferment, each frame carrie