Region Authority (RA) Collaborated Certificate Organization and Management in VANET
|
|
- Bethanie Reed
- 7 years ago
- Views:
Transcription
1 Region Authority (RA) Collaborated Certificate Organization and Management in VANET Shahnawaj Khan CSE Department National Institute of Technology, Hamirpur Hamirpur, India Abstract- Vehicular ad hoc networks (VANETs) are receiving increasing attention from academics due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables lifecritical applications, such as the alerting functionality during medical emergencies, and thus, plays a key role in VANET applications. In a VANET, vehicles rely on the integrity of receiving data for deciding when to present alerts to drivers. The communication between car to car, car to the roadside unit done through wireless communication. That is why security is an important concern area for vehicular network application. For authentication purposes large amount of bandwidth is consumed and the performance becomes low. In VANET some serious network attacks such as man in the middle attack, masquerading is possible. In this paper various previous researches done in this area are analyzed and compared on the basis of drawbacks of those approaches. After that the different issues on VANET are discussed and finally conclude with proposed idea. Keywords-Security, Region authority (RA), on board unit (OBUs), certificate revocation lists (CRLs). I. INTRODUCTION Vehicular Ad-Hoc Network is a special class of Mobile Ad-Hoc Networks (MANETs) in which communication link is established between road side units (RSUs) and on board units (OBUs), OBUs to OBUs in a short range of 100 to 300 m and between RSUs to RSUs. To enable application for safety, traffic, driver assistance, infotainment vehicular communication is evolving very rapidly. But the race of providing various services raises the security concern and makes VANET vulnerable to various attacks like jamming, forgery, privacy violation, on board tampering. Existing protocols to secure VANETs resolves these issues up to some extent but raises some concerns on the basis of which, this paper reviews the different schemes developed for VANET. More specifically, the purpose of the paper is to survey the literature, and provide an overview of the extent of the research done in the area of VANETs and also provide some protocols to resolve the security issues. This paper is organized as follows: In the second section the challenges for the security in VANET are discussed. In the third section, previous work that is close to this approach has been discussed. In the fourth section, system model which we Naveen Chauhan CSE Department National Institute of Technology, Hamirpur Hamirpur, India naveenchauhan.nith@gmail.com assumed for the proposed scheme is discussed. In the fifth section, evaluation criteria are discussed based on which proposed scheme is evaluated. In section sixth proposed scheme is discussed. In section 7 paper is concluded. II. CHALLENGES The most significant challenges of VANET are A.Network Volatility The connectivity among nodes can often be highly transient and a one-time event (same vehicles may not get the chance to communicate again). For example, two vehicles (nodes) traveling on a highway may remain within their transceiver range, or within a few wireless hops, for a limited period of time. Hence password-based establishment of secure channels, gradual development of trust by enlarging a circle of trusted acquaintances, or secure communication only with a handful of endpoints and may be impractical for Securing vehicular communication (VC). B. Authentication vs. Privacy In the process of providing authentication for communication between OBUs, The privacy of the sender can be revealed and can pose threat to the sender by many ways like tracking someone s location, journey details. C. Delay Sensitive Applications Many of the safety and driver-assistance applications Pose strict deadlines for message delivery or are Time-sensitive. Security mechanisms must take these constraints into consideration and impose a low processing and messaging overhead. D. Network Scale The scale of the network, with roughly a billion vehicles around the globe, is another challenge. E. Heterogeneity The heterogeneity in VC technologies and the supported applications are additional challenges, especially taking into account the gradual deployment. With nodes possibly equipped with cellular transceivers, digital audio and Global Positioning System (GPS) but with the current standard architecture using the vehicular public key infrastructure (PKI)
2 and tamper proof device (TPD) and various protocols these problems are resolved up to some point. III. PREVIOUS WORK In VANETs, the primary security requirements are identified as entity authentication, message integrity, nonrepudiation, and privacy preservation. The PKI is the most viable technique to achieve these security requirements. In [6] author proposed TACKs for certificate organization and vehicle revocation in a VANET, which we consider to be the most relevant and closely related scheme to the work we propose in this paper. TACK adopts a hierarchy system architecture consisting of a central trusted authority and regional authorities (RAs) distributed all over the network. The authors adopted group signature where the trusted authority acts as the group manager and the vehicles act as the group members. Upon entering a new region, each vehicle must update its certificate from the RA dedicated for that region. The vehicle sends a request signed by its group key to the RA to update its certificate, the RA verifies the group signature of the vehicle and ensures that the vehicle is not in the current Revocation List (RL). After the RA authenticates the vehicle, it issues short lifetime region-based certificate. This certificate is valid only within the coverage range of the RA. It should be noted that TACK requires the RAs to wait for some time, e.g., 2 seconds, before sending the new certificate to the requesting vehicle. It restricts the vehicle to send messages to neighboring vehicles within this period, which makes TACK not suitable for the safety applications. Also, TACK requires the RAs to completely cover the network, otherwise, the TACK technique may not function properly. This requirement may not be feasible especially in the early deployment stages of VANETs. In [1] author considers the deployment stage of VANET and proposes 3 protocols revocation using tamper proof device (RTPD) which uses the tamper proof device (TPD) to revoke all the certificates of the malicious vehicle with the help of radio or FM to broadcast in case of vehicle is not in the range of road side units (RSUs), distributed revocation protocol (DRP) which uses group based revocation technique to revoke the certificate. In case if any vehicle is suspected of doing malicious activity by its neighbor and if then the numbers of neighbors are greater than a certain threshold then they inform it to the CA to remove its certificate. The last is revocation using compressed certificate revocation list (RCCRL) which uses the distribution of the only updated and compressed list. For privacy it proposes using a set of anonymous keys that change frequently. These keys are preloaded in the vehicle s TPD for a long duration. For authentication vehicles will sign each message with their private key and attach the corresponding certificate. To reduce the security overhead, it uses the approach of elliptic curve cryptography (ECC). In [2] author does not consider the deployment stage problem. It uses the RSU aided certificate revocation scheme in which RSU checks all passing vehicles for revoked certificates which are already stored at RSUs distributed by the CAs to the RSUs. If revoked certificate is found from any malicious vehicle it inform to all local vehicles about the revoked certificate by broadcasting it locally. This helps in reduction in the size of the CRL and high cost of the distribution of the CRL. It also considered revocation using tamper proof device (RTPD), DRP, RCCRL which reduce the size of the CRL. It follows group signature and identity based signature (GSIS) to preserve the privacy of the vehicle. In [3] author only focuses on the CRL size and its distribution. It divides the CRL into various parts uses network coding and erasure coding to reassemble complete CRL with few pieces. Using erasure coding, a node will simply send out the same pieces it received without making any changes. Using network coding, a node will generate linear combinations of all of the pieces currently possessed, requiring greater processing capability at every OBU. Erasure coding has less overhead, both in packet overhead carry the coding information, and in processing overhead to reconstruct the file. It uses vehicle to vehicle (V2V) communicate to forward pieces between vehicles. The Most Pieces Broadcast method creates a situation where only the node with the most number of CRL file pieces is selected to broadcast within a given radio broadcast range. In [4] author focuses on the issue of authentication and privacy. Here CA uses a pseudo random key generator (PRNG) to generate all the certificates of a single vehicle so that only CA can backtrack the detail of the source. CA generate all the certificates by selecting a random number "n" then generate all the certificates from it and send all the certificates to the corresponding vehicle and hold the random no to itself so that in case of need of detail of the sender only CA can back track the identity of the vehicle. It also uses the group certificate policy in which vehicles have a very large database of certificate up to each certificate is valid up to a very short time period to ensure a high level of privacy. In [5] author uses a new approach to accelerate the certificate validation procedure by adding 2 new attributes credibility and issued date. Credibility is the measure of the authenticity of a particular vehicle. If a vehicle is having high credibility then it is a more trust full vehicle and the other one shows the date at which the particular certificate has been issued. With k-mean clustering it divide CRL into the k- cluster. Each cluster is divided based on these two new attributes. Whenever a request arrives, to check its validity it is compared with the certificate resides in its cluster only which in term reduces the overhead to search the entire CRL. IV. SYSTEM MODEL As shown in Fig. 1, the system model under consideration consists of the following: A. Certificate Authority(CA) It is responsible for providing anonymous certificates and distributing secret keys to all RAs and OBUs in the network. It is assumed that it cannot be compromised.
3 B. Region Authorities (RAs) These are fixed units dedicated only one for a region. RAs are the middleware between CAs and RSUs. It is assumed that it cannot be compromised. C. Roadside Units (RSUs) RSUs are considered to be fixed and installed throughout the network. The RSUs can communicate securely with their RAs. It can be compromised because these lies near the road so attacker can easily reach to them. D. On Board Unit (OBUs) These are embedded in vehicles. OBUs can communicate either with other OBUs through V2V communications or with RSUs through vehicle to infrastructure (V2I) communications. These have the highest chances of being attacked. According to the WAVE standard, each OBU is equipped with a TPD, which is a tamper-resistant resistant module used to store the security materials, e.g., secret keys and certificates of the OBU. Also, the TPD in each OBU is responsible for performing all the cryptographic phic operations such as signing messages, verifying certificates, keys updating. We consider that legitimate OBUs cannot collude with the revoked OBUs as it is difficult for legitimate OBUs to extract their security materials from their TPDs. Finally, we consider that a compromised OBU is instantly detected by the RA. V. PROPOSED SCHEME In this approach the functionality of RAs and RSUs are very distinct as compare to the other scheme, we have seen so far. OBUs are loaded with certificates in its tamper proof devices (TPDs) by the certificate authorities (CA), which are valid for a long time. These are loaded with large numbers so that OBUs need to update only once in a year. Certificates are generated by the CA for each OBUs and only CA can recover the original identity of the OBUs. Algorithm 1 Certificate Generation Algorithm 1. M = no. of certificates per time interval for vehicle. 2. I = no. of time intervals during a reload period. 3. Begin 4. n = get random number() 5. for i = 1 to I do 6. S i = H i (n) 7. for j = 1 to M do 8. (PK j,i, SK j,i ) = generate public private key pair() 9. SIG CA,j,i = SIGN(H{E Si (j), PK j,i }), SK CA ) 10. CERT j,i = {E Si (j), PK j,i, SIG CA,j,i} 11. UPLOAD((CERT 1,i,PK1,i,SK1,i SK1,i)...,(CERT M,i, PKM,i, SKM,i)) at OBU 12. end for 13. end for 14. end Whenever the vehicle enters a new region, it needs to obtain the certificate for that region. With the help of road side units (RSUs) which are used only for communication purpose only in this approach because they are located near the road and highly vulnerable to attack.. RSUs here are used only to cover the entire network. Once RSU get any request for the certificate by a vehicle. It forwards it to the RA of its region. RA has two types of certificate revocation lists (CRLs). Revocation list of RSUs as well as the revocation list of the OBUs. Revocation list of the OBUs at RA is provided by the CA while the RL of RSUs is generated by RA itself by detecting any malicious activity by any RSU. On getting any request by any OBU it checks it against all the entries of the CRL for the OBUs. If no entry is found then it generate a temporary certificate, valid for a short time period and in that region only. These certificates are sent to the corresponding vehicle Fig.1. System model
4 along with the CRL of OBUs as well as RSUs of that region only. CRL is very small in size to distribute and search. CRL is also updated time to time on any revocation of certificate by distributing only required pieces of information. Algorithm 2 Certificate updation algorithm AT OBU 1. N = no. of possible regions in path. 2. Begin 3. for i = 1 to N do 4. X = SIGN SK (PK,CERT CA ) 5. SEND(X,PK,CERT CA ) to RA 6. end for 7. end AT RSU 1. Begin 2. verify(x,cert CA ) 3. (PK V, SK V, ) = generate public private key pair() 4. Y = SIGN SKRA (PK V, CERT CA ) 5. CERT RA = (Y, Expiration, RA id ) 6. add (X, CERT RA ) in history table of RA 7. SEND (CERT RA, PK V, SK V, RA id, CRL OBU, CRL RSU )to OBU 8. End A. Certificate Generation To upload certificates initially in an OBU, it requires a number of certificates for a time interval as well as the number of time intervals during a reload period. Here n is a random number, the S i is a key to some block of certificates. It is generated by hashing n by i times using some hash function 'H'. PK and SK are public and secret key pair. Signature is used to ensure integrity of the certificates by hashing the public key and encrypted value of 'j' using block identifier 'S' and then applying some signature algorithm with the secret key of CA. Certificates are generated by using sign, public key, and encrypted value. Now these are uploaded to the OBU. B. Certificate Updation N is the number of possible region a vehicle can enter. OBU send its request to each RA for their certificates by sending a sign of PK and certificate CERT issued by the CA using its SK. Now on receiving the request from an OBU each RA verifies its signature and then its certificate. If it is not found in CRL then generate new public-private key pair and sign OBU's public key and its CERT issued by a CA by its SK. now it generates a new regional certificate with sign, expiration period and its region authority id. It further adds the mapping detail in its history table and then sends the certificate of its region and ID of its region to the OBU. C. Certificate authentication and verification Each OBU need to authenticate to each other before the start of communication. Sender OBU initially broadcast its PK to all the other OBUs as well as RA. For authentication, sender OBU generate the signature by signing the message M by its SK Y = SIGN SK (M) And then send (Y,M,CERT RA ) to the receiving OBU. On receiving the above parameters receiving OBU needs to verify before to start the communication. First receiving OBU checks the validity of the sign Y, then check the CERT RA against all entries of the CRL. IF match found M is dropped else further communication will be established. In TACK [6] RA delay the around 2 min to process the request of OBUs which is not considerable by VANET applications. In this paper RA collaborated approach is proposed to resolve such issue. Each RA is connected with their neighbor RAs to reduce the delay in the process. Before entering a new region OBUs can be easily facilitated by the functionality of early request of the certificate. Hence OBUs can have the certificate of the region even before entering it. Sometime it may also be possible that at any point vehicle can have a choice to enter into more than one region but generally it is restricted to either two or three regions possibility. In such case vehicle gets the early certificate of each region and with few choices it cannot be an accountable waste of resources. It considers all the challenges and facts about the VANET. The Deployment stage problem is resolved by providing only one RA for each region. It also restricts the work of RSUs with covering the network only. It also provides the low cost deployment with most of the coverage. It also provides the authentication with RA certificate as well as group based key while preserving the privacy. With pseudonymous certificates and the hierarchy approached used here. Search and distribution of CRLs also cost very low because of very few entries in each CRL to deal with. VI. EVALUATION CRITERIA In this section we define a set of evaluation criteria which will help us in the comparison of the different schemes. Following is a list of the evaluation criteria used in the revocation schemes in VANETs. A. Deployment Stage of VANET The very first thing to consider is deployment stage because currently either VANET is an idea for most of the world or it is in the deployment stage. To fulfill the complete objective of secure VANET. Deployment stage must be considered because each protocol has their different performance in partial and full deployment of VANET. B. Size of Certificate Revocation List and its Distribution As the revocation of certificates takes place frequently. And the size of the VANET is very large with having millions of vehicles around the globe. The problem of distribution of
5 the certificate revocation list (CRL) costs very huge amount of time and bandwidth. And with such huge size of CRL it also needs huge storage AT on board units (OBUs) as well as high processing speed to search that huge CRL. C. Authentication vs. Privacy Although each proposed scheme provides different methods for authentication between vehicles as well as providing privacy for the sender but there is a need to evaluate the performance of each protocol to ensure a high level of authentication while providing complete privacy in which only higher authorities can have the right to access the detail of the sender under any case of malicious activity. VII. CONCLUSION This paper proposes RAs based certificate organization and management scheme which resolves the basic challenges of VANET and provide a feasible solution of the deployment of VANET, The huge size of CRLs and its distribution and search, authentication and privacy. In comparisons with the available protocols, it can be deduced that the RA collaboration scheme will give better results than the existing ones. As the next step towards our research, we would like to augment this research with mathematical analysis and simulation result. REFERENCES [1] M Raya, P Papadimitratos and JP Hubaux, Securing Vehicular Communications, IEEE Wireless Communications, vol. 13, no. 5, pp. 8-15, October [2] X. Lin, R. Lu, C. Zhang, H. Zhu, P. Ho and X. Shen, Security in Vehicular Ad Hoc Networks, IEEE Communications Magazine, vol. 46, no. 4, pp , April [3] Michael E. Nowatkowski and Henry L. Owen, Certificate Revocation List Distribution in VANETs Using Most Pieces Broadcast, proceedings of the IEEE SoutheastCon, pp , [4] Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux, Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas In Communications, vol. 29, no. 3, pp , March [5] Qingwei Zhang, Mohammed Almulla, Yonglin Ren and Azzedine Boukerche, An Efficient Certificate Revocation Validation Scheme with k-means Clustering for Vehicular Ad hoc Networks, IEEE Symposium on Computers and Communications (ISCC), pp , [6] Ahren Studer, Elaine Shi, Fan Bai and Adrian Perrig, TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs, 6 th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad-Hoc Communications and Networks, pp. 1-9, 2009 [7] Albert Wasef and Xuemin Shen, EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol. 12, no. 1, pp , January [8] Vighnesh N V, N Kavita, Shalini R. Urs and Srinivas Sampalli, A Novel Sender Authentication Scheme Based on Hash Chain for Vehicular Ad-Hoc Networks, IEEE Symposium on Wireless Technology and Applications (ISWTA), pp , September [9] Hind AI Falasi and Ezedin Barka, Revocation in VANETs: A Survey, IEEE International Conference on Innovations in Information Technology (IIT), pp , [10] Albert Wasef, R. Lu, X. Lin and X. Shen, Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks, IEEE Wireless Communications, vol. 17, no. 5, pp , October [11] Ghassan Samara, Wafaa A.H. Al-Salihy and R. Sures, Security Analysis of Vehicular Ad Hoc Networks (VANET), Second International Conference on Network Applications Protocols and Services (NETAPPS), pp , [12] Nurain Izzati Shuhaimi and Tutun Juhana, Security in Vehicular Ad-Hoc Network with Identity-Based Cryptography Approach: A Survey, IEEE 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp , 2012.
Efficient Certificate Management in VANET
Efficient Certificate Management in VANET Ghassan Samara #1, Wafaa A.H. Al-Salihy *2, R. Sures #3 # National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia 1 ghassan@nav6.org, 3 sures@nav6.org
More informationA New Security Mechanism for Vehicular Communication Networks
A New Security Mechanism for Vehicular Communication Networks Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. gsamarah@yahoo.com
More informationCertificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Ms. Rupali H. Kandhari PG Student, Department of Computer Engineering, JSPM s RSCOE, Tathawade, Pune.
More informationCertificate Revocation Management in VANET
Certificate Revocation Management in VANET Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. Gsamara@zu.edu.jo ABSTRACT Vehicular
More informationDesign of Simple and Efficient Revocation List Distribution in Urban areas for VANET s
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Ghassan Samara, Sureswaran Ramadas National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia ghassan@nav6.org,
More informationProxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks
Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks CH. SHIREESHA 1, P PROMAD KUMAR 2 1 M.Tech Student, CSE, SR Engineering College, Warangal,Telangana,India. 2 Assistant
More informationImplementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)
More informationCOMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS
SECURITY AND P RIVACY IN E MERGING WIRELESS N ETWORKS COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS ALBERT WASEF AND RONGXING LU, UNIVERSITY OF WATERLOO XIAODONG LIN, UNIVERSITY
More informationSecurity Challenges And Implementation Mechanism For Vehicular Ad Hoc Network
Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network Mostofa Kamal Nasir, A.S.M. Delowar Hossain, Md. Sazzad Hossain, Md. Mosaddik Hasan, Md. Belayet Ali Abstract: - Vehicular
More informationEFFICIENT SECRURITY IMPLEMENTATION FOR EMERGING VANETS
EFFICIENT SECRURITY IMPLEMENTATION FOR EMERGING VANETS Chan Yeob Yeun, Mahmoud Al-Qutayri, Faisal Al-Hawi Khalifa University of Science Technolgoy and Research, UAE {cyeun, mqutayri, f.alhawi}@kustar.ac.ae
More informationAn Investigation of DOS Flooding Attack in VANET.
A B S T R A C T International Journal of Advance Foundation and Research in Computer (IJAFRC) An Investigation of DOS Flooding Attack in VANET. Vikash Porwal, Rajeev Patel, Dr. R. K. Kapoor. National Institute
More informationWIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationCryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationProblems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationSecurity of Emerging wireless networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch Security of Emerging wireless networks Generalities Mesh networks 2007 Levente Buttyán and Jean-Pierre Hubaux Introduction Emerging
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationEnforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks
Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks Yong Xi, Kewei Sha, Weisong Shi and Loren Schwiebert Wayne State University {yongxi,kewei,weisong,loren}@wayne.edu Tao Zhang Telcordia
More informationSecuring vehicular ad hoc networks
Journal of Computer Security 15 (2007) 39 68 39 IOS Press Securing vehicular ad hoc networks Maxim Raya and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA), School of Computer
More informationPreventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks
152 JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 2010 Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks Hany Samuel and Weihua Zhuang
More informationCertificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
More informationSecuring Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
More informationIntelligent transportation systems: Past, present and look to future by using Grid technology
Intelligent transportation systems: Past, present and look to future by using Grid technology Behin Alipour Islamic Azad University of Tabriz Alipour_behin@yahoo.com Abstract Existing technologies in ITS
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationA SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
More informationReview of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationSecuring Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks
Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,
More informationThe Security of Vehicular Ad Hoc Networks
The Security of Vehicular Ad Hoc Networks Maxim Raya and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences EPFL, Switzerland
More informationIMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
More informationA framework using IBC achieving non-repudiation and privacy in vehicular network.
A framework using IBC achieving non-repudiation and privacy in vehicular network. Amira Bradai, Afifi Hossam To cite this version: Amira Bradai, Afifi Hossam. A framework using IBC achieving non-repudiation
More informationLecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT
Lecture 7: Privacy and Security in Mobile Computing Cristian Borcea Department of Computer Science NJIT Location Privacy Location Authentication Trusted Ad Hoc Networks 2 Privacy Violated Request: Retrieve
More informationElectronic Network - Advantages and Disadvantages
Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism Shobhana S PG Scholar, Dept of CSE, Apollo Priyadarshanam Institute of Technology, Chennai Abstract Wireless
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationThe Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
More informationLecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
More informationAn Implementation of Public Key Infrastructure Using Wireless Communication Networks
, pp.35-42 http://dx.doi.org/10.14257/ijgdc.2015.8.3.04 An Implementation of Public Key Infrastructure Using Wireless Communication Networks Nandhini M 1 and PraveenkumarB 2 1 PG Scholar, Muthayammal Engineering
More informationAn Enhanced Security Protocol for VANET-based Entertainment Services
IEICE TRANS. FUNDAMENTALS/COMMUN./ELECTRON./INF. & SYST., VOL. E85-A/B/C/D, No. xx JANUARY 20xx REGULAR PAPER An Enhanced Security Protocol for VANET-based Entertainment Services 1 Jung-Yoon Kim, Student
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationSecure Neighbor Discovery in Wireless Sensor Networks
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu
More informationA survey on securing user authentication in vehicular ad hoc networks
A survey on securing user authentication in vehicular ad hoc networks Mrs. Arzoo Dahiya Assistant Professor Computer Science & IT Department Institute of Technology and Management Sector-23 A, Gurgaon-122017
More informationSingle Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
More informationEfficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu Peng Ning Department of Computer Science North Carolina State University Raleigh,
More informationPacket Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationBUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY
SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationSecuring Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
More informationKey Management and Distribution
and Distribution CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex,
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More informationA Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
More informationSECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
More informationIII. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,
More informationWireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
More informationCERTIFICATE REVOCATION LIST DISTRIBUTION IN VEHICULAR AD HOC NETWORKS
CERTIFICATE REVOCATION LIST DISTRIBUTION IN VEHICULAR AD HOC NETWORKS A Dissertation Presented to The Academic Faculty By Michael E. Nowatkowski In Partial Fulfillment Of the Requirements for the Degree
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationBabel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang
More informationA Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks
A Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks Jetzabel M. Serna-Olvera Computer Architecture Department Universitat Politècnica de Catalunya A thesis submitted for the degree of Doctor
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationPublic Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)
Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent
More informationSAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks
IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman)
More informationInternet Sustainability and Network Marketing Safety
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been
More informationAn Approach to Enhance in Group Signature Scheme with Anonymous Revocation
An Approach to Enhance in Group Signature Scheme with Anonymous Revocation Thu Thu Mon Oo, and Win Htay Abstract This paper concerns with the group signature scheme. In this scheme, anyone who can access
More informationPublic-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
More informationGroup Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationSecured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
More informationNetwork Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
More informationA SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
More informationBootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation Katrin Hoeper and Guang Gong khoeper@engmail.uwaterloo.ca, ggong@calliope.uwaterloo.ca Department of Electrical
More informationSecure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,
More informationSecuring Wireless Mesh Networks
Securing Wireless Mesh Networks Naouel Ben Salem Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL Lausanne, Switzerland naouel.bensalem@epfl.ch jean-pierre.hubaux@epfl.ch
More informationResistance of Denial-of-Service Attack in Network Coding using Node Authenticity
Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity P. ANITHA PG Scholar Dept. of Computer Science Velalar College of Engineering and Technology ANNA UNIVERSITY, CHENNAI anita4890@gmail.com
More informationTema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
More informationA Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
More informationCar Connections. Johan Lukkien. System Architecture and Networking
Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:
More informationChapter 14. Key management and Distribution. Symmetric Key Distribution Using Symmetric Encryption
Chapter 14. Key management and Distribution Symmetric Key Distribution Using Symmetric Encryption For symmetric encryption to work, the two parties to an exchange must share the same key, and that key
More informationSpecial Properties of Ad-hoc Wireless Network and Security Models
Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of
More informationIntroduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationSecurity Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
More informationIntelligent Transportation System for Vehicular Ad-Hoc Networks
Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular
More informationKEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
More informationAn Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture
435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract
More informationISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationDDoS Attack on WAVE-enabled VANET Through Synchronization
DDoS Attack on WAVE-enabled VANET Through Synchronization Subir Biswas Department of Computer Science University of Manitoba Winnipeg, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Department
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationSECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
More informationOn the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationAuthentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
More informationLecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
More informationCHAPTER 5 ACO BASED MOBILE AGENT FOR SECURED KEY MANAGEMENT
112 CHAPTER 5 ACO BASED MOBILE AGENT FOR SECURED KEY MANAGEMENT 5.1 Related Work Security in ad hoc network becomes a critical issue for the past few decades. Attacks will be avoided by authenticating
More information