Download Now Free registration required
In an ad hoc network, nodes may face the need to generate new public keys. To be verifiably authentic, these newly generated public keys need to be certified. However, because of the absence of a permanent communication infrastructure, a Certification Authority (CA) that can issue certificates may not always be reachable. The downside is that secure communication channels cannot be established. Previously proposed solutions do not guarantee that identities contained in certificates are valid or, when they do, they rely on neighbors to validate user-key bindings. However, there is no guarantee that nodes that are known in advance will always be present in the network.
- Format: PDF
- Size: 786.2 KB