The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad Hoc network is a new type of wireless mobile networks. It does not rely on any fixed infrastructure, no center nodes, and its computing resources are limited. According to identity-based cryptography, threshold sharing scheme and mapping point algorithm, this paper presents a new Ad Hoc network security model, and verifies its safety. Safe mode without third party KGC includes sharing scheme, communication...
An ad hoc network is characterized by the absence of any central infrastructure. Since the network is formed in fly, nodes may either join or leave the network at their wish. Since there are no dedicated routers, routing function is accomplished through multiple peer-peer connections. Thus any malicious node may offer routing voluntarily in order to attract more traffic towards it. In order to establish...
A secure encryption protocol for mobile ad hoc networks is proposed based on cluster-based structure. In proposed scheme, we employ a one-way key chain and polynomial function as the basic means of constructing the encryption procedure in order to reduces the need for public key cryptography and shortage overhead. The proposed protocol avoids massive message exchanges for key setup that are sent during...
Delivering messages anonymously in ad hoc network is very important because of the special characteristics. Meantime, a trusted third party can trace the message sender by using some secret keys in case of dispute. Recently, a multi-PKG ID-based signcryption scheme for ad hoc networks is proposed, which is semantic security and existential unforgeability in random oracle model. But it is not anonymous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.