A practical approach of ID-based cryptosystem in ad hoc networks

Cited 2 time in webofscience Cited 5 time in scopus
  • Hit : 416
  • Download : 116
DC FieldValueLanguage
dc.contributor.authorKim, Hko
dc.contributor.authorSong, Jko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2009-08-14T01:55:09Z-
dc.date.available2009-08-14T01:55:09Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2007-09-
dc.identifier.citationWIRELESS COMMUNICATIONS & MOBILE COMPUTING, v.7, pp.909 - 917-
dc.identifier.issn1530-8669-
dc.identifier.urihttp://hdl.handle.net/10203/10525-
dc.description.abstractAs research in ad hoc networking has advanced, the importance of security increases more and more. But it suffers from the restriction that ad hoc networks do not have the established infrastructure. In this paper we propose a security-enhanced model with ID-based cryptosystem which removes the necessity for any infrastructure and provides sound authentication. Also we provide a more secure and concrete routing protocol with aggregate signature. For confidentiality, we also provide a key exchange protocol. And our model not only distributes the role of key generation center in ID-based cryptosystem to the nodes with threshold cryptography, but also increases availability by providing a secret re-sharing protocol. Therefore, our model is very appropriate for ad hoc networks. Copyright (c) 2007 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherJOHN WILEY & SONS INC-
dc.titleA practical approach of ID-based cryptosystem in ad hoc networks-
dc.typeArticle-
dc.identifier.wosid000249293500008-
dc.identifier.scopusid2-s2.0-34548453028-
dc.type.rimsART-
dc.citation.volume7-
dc.citation.beginningpage909-
dc.citation.endingpage917-
dc.citation.publicationnameWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.identifier.doi10.1002/wcm.500-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorKim, H-
dc.contributor.nonIdAuthorSong, J-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorad hoc network-
dc.subject.keywordAuthorID-based cryptosystem-
dc.subject.keywordAuthorsecure routing-
dc.subject.keywordAuthorthreshold cryptography-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 2 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0