Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis

Free registration required

Executive Summary

Due to their versatility, decentralized infrastructure and other unique properties, there has been a growing interest in Mobile Ad hoc NETworks (MANETs) for military, government and commercial applications. A primary security challenge in such networks is the likelihood of node compromises caused by weak physical protection and potentially hostile environments. This means that key revocation mechanisms are essential and nodes must be capable of instantly verifying whether the key of another node has been revoked. Because of the decentralized nature of MANETs, revocation schemes must be based on the nodes' own observations.

  • Format: PDF
  • Size: 379.6 KB