Article ID Journal Published Year Pages File Type
446756 Ad Hoc Networks 2007 8 Pages PDF
Abstract

In this paper we discuss the unique security characteristics of cell phones in ad hoc mode for emergency applications. We assume as first security requirements: secure authentication with non-repudiation, the need to stop the spread of malicious information as soon as possible, and the defence against potential Denial of Service.We provide solutions to the above security challenges for cell phone in ad hoc mode for emergency applications. In particular, we take advantage of the fact that cell phones were once part of a centralized network, which makes the distribution of security and trust information easier. We use identity based Cryptography to solve the problem of secure authenticated broadcast with non-repudiation.

Keywords
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , , ,