Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, T. Nagase, Y. Yoshioka
{"title":"移动Ad-hoc网络中证书管理节点之间的信任构建","authors":"Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, T. Nagase, Y. Yoshioka","doi":"10.1109/WAINA.2012.36","DOIUrl":null,"url":null,"abstract":"Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. These networks are inherently vulnerable to security attacks from malicious users. Therefore, providing distinct security for ad hoc networks becomes a primary concern and requires several challenges to be achieved. One main challenge is how to manage public keys' certificates among ad hoc nodes. This paper introduces a fast and secure clustering scheme by select candidate's nodes using voting method, This method is to select certificates management node which manages certificates on behave of other nodes in ad hoc network.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network\",\"authors\":\"Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, T. Nagase, Y. Yoshioka\",\"doi\":\"10.1109/WAINA.2012.36\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. These networks are inherently vulnerable to security attacks from malicious users. Therefore, providing distinct security for ad hoc networks becomes a primary concern and requires several challenges to be achieved. One main challenge is how to manage public keys' certificates among ad hoc nodes. This paper introduces a fast and secure clustering scheme by select candidate's nodes using voting method, This method is to select certificates management node which manages certificates on behave of other nodes in ad hoc network.\",\"PeriodicalId\":375709,\"journal\":{\"name\":\"2012 26th International Conference on Advanced Information Networking and Applications Workshops\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 26th International Conference on Advanced Information Networking and Applications Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WAINA.2012.36\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2012.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. These networks are inherently vulnerable to security attacks from malicious users. Therefore, providing distinct security for ad hoc networks becomes a primary concern and requires several challenges to be achieved. One main challenge is how to manage public keys' certificates among ad hoc nodes. This paper introduces a fast and secure clustering scheme by select candidate's nodes using voting method, This method is to select certificates management node which manages certificates on behave of other nodes in ad hoc network.