On demand distributed public key management without considering routing tables for wireless ad hoc networks

Yuko Kitada, Keisuke Takemori, Akira Watanabe, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

A wireless ad hoc network that has no connection to the Internet can not use a Public Key Infrastructure(PKI). Although an on demand distributed public key management to construct the PKI has been proposed, it cannot work without considering routing tables, since nodes broadcast a packet which contains routing tables. In this paper, we propose an on demand distributed public key management which can separate the routing and authentication layers. In the proposed scheme, each node sends a packet which does not contain routing tables by unicasting. The proposed scheme can be applied to various communication protocols and simple terminals because the scheme does not need to consider routing tables in the authentication layer. By a computer simulation, we evaluate average traffic and show the adaptive flexibility of the proposed scheme in the ad hoc network.

Original languageEnglish
Title of host publication6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings
Pages375-380
Number of pages6
Publication statusPublished - 2005 Dec 1
Event6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Yangon, Myanmar
Duration: 2005 Nov 92005 Nov 10

Publication series

Name6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings
Volume2005

Other

Other6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005
Country/TerritoryMyanmar
CityYangon
Period05/11/905/11/10

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'On demand distributed public key management without considering routing tables for wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this