On demand distributed public key management for wireless ad hoc networks

Yuko Kitada, Akira Watanabe, Iwao Sasase, Keisuke Takemori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Abstract

A wireless ad hoc network that has no connection to the Internet has difficulty to construct a Public Key Infrastructure (PKI) when the network does not provide online access to trusted authorities. In this paper, we propose an on demand distributed public key management to construct the PKI for wireless ad hoc networks. The proposed system collects effective certificates on demand. Each node holds in its local repository only the certificates issued to it in order to reduce the amount of memory. To collect certificates efficiently, we propose an Ad hoc Simultaneous Nodes Search protocol (ASNS) that can search chained nodes using broadcast packets and routing tables. The proposed system can reduce memory size for authentication and does not have to manage a Certificate Revocation List (CRL). By a computer simulation, we show that the system is advantageous to the network in which density of the node is low.

Original languageEnglish
Title of host publication2005 IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, PACRIM - Proceedings
Pages454-457
Number of pages4
DOIs
Publication statusPublished - 2005 Dec 1
Event2005 IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, PACRIM - Victoria, BC, Canada
Duration: 2005 Aug 242005 Aug 26

Publication series

NameIEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings
Volume2005

Other

Other2005 IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, PACRIM
Country/TerritoryCanada
CityVictoria, BC
Period05/8/2405/8/26

ASJC Scopus subject areas

  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'On demand distributed public key management for wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this