Identification in infrastructureless networks

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Confidential communications require entities to mutually authenticate and establish secure communication channels, where the latter requires secret keys to be established between entities. Both -mutual authentication and secure communication- can be achieved by non- revoked public key certificates. However, in infrastructureless networks -such as ad hoc networks-, online trusted third parties (TTP) may not be present that can distribute the required information to verify the revocation status of a certificate. This can prevent confidentiality from being provided. In this paper we define a protocol which permits nodes in an ad hoc network without a shared secret key and without guaranteed access to a TTP, firstly, to mutually authenticate and, secondly, to verify the revocation status of a certificate. © 2006 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kounga, G., & Walter, T. (2006). Identification in infrastructureless networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4357 LNCS, pp. 58–69). https://doi.org/10.1007/11964254_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free