Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
446756 | Ad Hoc Networks | 2007 | 8 Pages |
Abstract
In this paper we discuss the unique security characteristics of cell phones in ad hoc mode for emergency applications. We assume as first security requirements: secure authentication with non-repudiation, the need to stop the spread of malicious information as soon as possible, and the defence against potential Denial of Service.We provide solutions to the above security challenges for cell phone in ad hoc mode for emergency applications. In particular, we take advantage of the fact that cell phones were once part of a centralized network, which makes the distribution of security and trust information easier. We use identity based Cryptography to solve the problem of secure authenticated broadcast with non-repudiation.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leonard Barolli,