Download now Free registration required
In this paper, the authors first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then they discuss the basic operations of their public-key management scheme: creation of public (and private) keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.
- Format: PDF
- Size: 224.6 KB