Abstract | ||
---|---|---|
We investigate how to disperse the certificates, issued in an ad-hoc network, among the network nodes such that the following condition holds. If any node u approaches any other node v in the network, then u can use the certificates stored either in u or in v to obtain the public key of v (so that u can securely send messages to v). We define the cost of certificate dispersal as the average number of certificates stored in one node in the network. We give upper and lower bounds on the dispersability cost of certificates, and show that both bounds are tight. We also present two certificate dispersal algorithms, and show that one of those algorithms is more efficient than the other in several important cases. Finally, we identify a rich class of "certificate graphs" for which the dispersability cost is within a constant factor from the lower bound. |
Year | DOI | Venue |
---|---|---|
2004 | 10.1109/ICDCS.2004.1281629 | ICDCS |
Keywords | Field | DocType |
constant factor,certificate dispersal,node u,certificate dispersal algorithm,dispersability cost,average number,ad-hoc network,lower bound,certificate graph,ad-hoc networks,node v,intelligent networks,graph theory,cryptography,computer networks,network nodes,public key cryptography,ad hoc networks,distributed computing,upper and lower bounds,message authentication,public key,ad hoc network | Graph theory,Mobile ad hoc network,Message authentication code,Upper and lower bounds,Computer science,Computer network,Node (networking),Wireless ad hoc network,Public-key cryptography,Distributed computing,Certificate | Conference |
ISSN | ISBN | Citations |
1063-6927 | 0-7695-2086-3 | 13 |
PageRank | References | Authors |
0.74 | 10 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed G. Gouda | 1 | 1982 | 317.23 |
Eunjin Jung | 2 | 125 | 13.06 |