English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21695245      Online Users : 680
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 會議論文 >  Item 310904400/7503


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/7503


    Title: DH-Based Communication Method for Cluster-Based Ad Hoc Networks
    Authors: Chang, C. C.;Lin, K. C.;Lee, J. S
    Date: 2005-11
    Issue Date: 2010-01-29 06:40:10 (UTC+0)
    Publisher: Asia University
    Abstract: Engineers have proposed lots of mechanisms for providing secure communications in ad hoc networks since the early 1990s. Due to the absence of fixed infrastructure, ad hoc networks are more vulnerable when encountering security threats than conventional wireless networks. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes that communicate with each other. All involved nodes in the network system share the responsibility for routing, access and communication. Namely, ad hoc networks are self-configurable networks with dynamic topologies. The main constraints on the design of mobile ad hoc networks include high power saving and low bandwidth. The public key infrastructure (PKI) is a well-known scheme used to ensure secure communications in mobile ad hoc networks. Based on PKI cryptosystems, Varadharajan et al. proposed a secure communication scheme in cluster-based ad hoc networks in 2004. However, with deep insight into Varadharajan et al.'s scheme, the computation loads of PKI become the heavy burden to each communicating member in the cluster. In this article, we propose a Diffie-Hellman (DH)-based scheme for providing confidential communications in ad hoc networks without adopting PKI cryptosystems. Furthermore, our scheme can preserve the forward secrecy and the backward secrecy of a group communication
    Relation: Second Asia Pacific Conference on Mobile Technology, Applications and Systems , pp. 2-2A-1: 1-8 , 2005-11. Guangzhou, China
    Appears in Collections:[資訊工程學系] 會議論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML277View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback