{"title":"移动Ad-Hoc网络中基于id的匿名私钥更新协议","authors":"Yohan Park, Y. Park, S. Moon","doi":"10.1109/ICCSA.2010.76","DOIUrl":null,"url":null,"abstract":"Security support is a must for ad hoc networks.Especially in dynamic topology, key update is essential to provide security. Also it need to protect node's identity in wireless environment. However, existing key update or key agreement scheme for ad hoc networks doesn’t consider these issues together. This paper propose ID-based private key update scheme and ID-based key agreement scheme in mobile ad hoc networks. These schemes are suitable for the infrastructureless mobile ad hoc networks.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"139 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"ID-Based Private Key Update Protocol with Anonymity in Mobile Ad-Hoc Networks\",\"authors\":\"Yohan Park, Y. Park, S. Moon\",\"doi\":\"10.1109/ICCSA.2010.76\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security support is a must for ad hoc networks.Especially in dynamic topology, key update is essential to provide security. Also it need to protect node's identity in wireless environment. However, existing key update or key agreement scheme for ad hoc networks doesn’t consider these issues together. This paper propose ID-based private key update scheme and ID-based key agreement scheme in mobile ad hoc networks. These schemes are suitable for the infrastructureless mobile ad hoc networks.\",\"PeriodicalId\":405597,\"journal\":{\"name\":\"2010 International Conference on Computational Science and Its Applications\",\"volume\":\"139 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Computational Science and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSA.2010.76\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Science and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSA.2010.76","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ID-Based Private Key Update Protocol with Anonymity in Mobile Ad-Hoc Networks
Security support is a must for ad hoc networks.Especially in dynamic topology, key update is essential to provide security. Also it need to protect node's identity in wireless environment. However, existing key update or key agreement scheme for ad hoc networks doesn’t consider these issues together. This paper propose ID-based private key update scheme and ID-based key agreement scheme in mobile ad hoc networks. These schemes are suitable for the infrastructureless mobile ad hoc networks.