Download Now Free registration required
Cryptographic key management is challenging due to the dynamicity and the unreliable communications. Moreover, in wireless ad-hoc the number of ad-hoc wireless devices deployed at an incident scene depends on the specific nature of the incident. It is computationally infeasible to design a key management scheme in current mission-critical networks to fulfill the required attributes to satisfy the needed attributes like data integrity, authentication, confidentiality, no repudiation and service availability. In a Scalable Method Of Cryptographic Key management (SMOCK) communication overhead is less, and it offers high service availability. Once the wireless devices are dispatched from the incident area, the centralized trusted server loses control of these devices.
- Format: PDF
- Size: 218.5 KB