Copyright 2010 world scientific publishing company

Info icon This preview shows pages 22–24. Sign up to view the full content.

Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 22

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

10 A. Naveed and S. Kanhere A Broadcast own private key share Reply from k neighbors with their private key share A is dependent on K neighbors for complete private key generation Fig. 1. Neighbor collaboration for private key generation in Wireless Mesh Networks. Note that threshold cryptography is based on the asymmetric crytopg- raphy where the private key is distributed among nodes as partial compo- nents. Consequently, the computational overheads involved in the schemes detailed above can be significantly higher. The process of combining the partial shares to generate the private key can incur additional delay. Fur- thermore, if a particular node does not have enough number of neighbors to collect k shares of the private key, its key will be revoked even if the node is legitimate and a well behaving member. Capkun et al. 29 have proposed a self-organized public-key management scheme for mobile ad hoc networks. The authors propose that each node issues its own public/private key pair, which binds the node identity with the issued keys. The neighboring nodes of a particular node can verify if a particular public key is associated with the identity of the node that claims the key. Based on this verification a certificate can be issued (signed using private key of the issuing node) and distributed to the nodes within the network. The certificates are issued for a specific time interval and renewed after that interval of time, provided that the identity of the node and the key binding is still trusted. This mechanism works as a distributed certi- fication authority. With random mobility of the nodes and the exchange of certificate repositories, the local certificate repositories of the nodes can quickly grow, establishing the trust relationship with other nodes. The cer- tificates are revoked explicitly if misbehavior or invalid identity-key binding is detected based on inconsistency between the neighboring node reposito- ries. The key authentication of a node v by a node u is performed through chain of certificates as follows: (i) The first certificate of the chain should be directly verifiable by u . i.e., signed by the public key of u . (ii) Each remaining certificate can be verified using public key contained in the previ- ous certificate of the chain. (iii) The last certificate contains the public key Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law.
Image of page 23
Image of page 24
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern