• DocumentCode
    2301580
  • Title

    Secure Communication Trees in Ad Hoc Networks

  • Author

    Nikodem, Jan ; Nikodem, Maciej

  • Author_Institution
    Inst. of Comput. Eng., Control & Robotics, Wroclaw Univ. of Technol.
  • fYear
    2007
  • fDate
    26-29 March 2007
  • Firstpage
    413
  • Lastpage
    421
  • Abstract
    In this paper we examine the communication trees widely used in ad hoc networks. These trees can be used in a number of ways e.g. to route or broadcast messages and to aggregate information. In this paper we propose a new key distribution protocol for large and dynamic ad hoc networks over unreliable channel. Protocol proposed here involves broadcast exclusion based on polynomial interpolation and secret key cryptography. Proposed scheme ensures security of broadcast and one-to-one communication, message authentication and gives a possibility to verify routing information. It also ensures t-resilience which means that up to t nodes can be compromised without influencing the security
  • Keywords
    ad hoc networks; cryptographic protocols; cryptography; message authentication; polynomials; protocols; telecommunication security; ad hoc networks; key distribution protocol; message authentication; polynomial interpolation; secret key cryptography; secure communication trees; Ad hoc networks; Aggregates; Broadcasting; Cryptographic protocols; Cryptography; Information security; Interpolation; Message authentication; Polynomials; Routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Engineering of Computer-Based Systems, 2007. ECBS '07. 14th Annual IEEE International Conference and Workshops on the
  • Conference_Location
    Tucson, AZ
  • Print_ISBN
    0-7695-2772-8
  • Type

    conf

  • DOI
    10.1109/ECBS.2007.64
  • Filename
    4148958