{"title":"增强Ad-hoc网络中的证书服务","authors":"Dat Tien Nguyen, B. Soh","doi":"10.1109/HONET.2008.4810235","DOIUrl":null,"url":null,"abstract":"Key management using threshold cryptography has proved its advantages by eliminating the dependence on an online central authority. However, some previous models are not suitable due to the inflexibility in dealing with keys. Moreover, solutions for those models are not complete; there are still vulnerabilities for attacks, especially DoS attacks. This paper will propose a more flexible modified key management scheme and a tolerant solution to reduce the attack risk. Our model will allow mobile nodes to generate their session keys instead of being associated with a fixed key in their whole lifetime. Besides, we propose using threshold cryptography to authenticate exchanged messages in an authentication process. Our solution can be shown to overcome the weaknesses of the existing algorithms.","PeriodicalId":433243,"journal":{"name":"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing the certificate service in Ad-hoc Networks\",\"authors\":\"Dat Tien Nguyen, B. Soh\",\"doi\":\"10.1109/HONET.2008.4810235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Key management using threshold cryptography has proved its advantages by eliminating the dependence on an online central authority. However, some previous models are not suitable due to the inflexibility in dealing with keys. Moreover, solutions for those models are not complete; there are still vulnerabilities for attacks, especially DoS attacks. This paper will propose a more flexible modified key management scheme and a tolerant solution to reduce the attack risk. Our model will allow mobile nodes to generate their session keys instead of being associated with a fixed key in their whole lifetime. Besides, we propose using threshold cryptography to authenticate exchanged messages in an authentication process. Our solution can be shown to overcome the weaknesses of the existing algorithms.\",\"PeriodicalId\":433243,\"journal\":{\"name\":\"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HONET.2008.4810235\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HONET.2008.4810235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing the certificate service in Ad-hoc Networks
Key management using threshold cryptography has proved its advantages by eliminating the dependence on an online central authority. However, some previous models are not suitable due to the inflexibility in dealing with keys. Moreover, solutions for those models are not complete; there are still vulnerabilities for attacks, especially DoS attacks. This paper will propose a more flexible modified key management scheme and a tolerant solution to reduce the attack risk. Our model will allow mobile nodes to generate their session keys instead of being associated with a fixed key in their whole lifetime. Besides, we propose using threshold cryptography to authenticate exchanged messages in an authentication process. Our solution can be shown to overcome the weaknesses of the existing algorithms.