티스토리 뷰
—Abstract—
Secure communication is very important in computer
networks and authentication is one of the most eminent
preconditions. However, common authentication schemes are not
applicable in ad hoc networks because public key infrastructures
with a centralized certification authority are hard to deploy
there. We propose and evaluate a security concept based on a
distributed certification facility. A network is divided into clusters
with one special head node each. These cluster head nodes execute
administrative functions and hold shares of a network key used
for certification. New nodes start to participate in the network
as guests; they can only become full members with a networksigned
certificate after their authenticity has been warranted by
some other members. The feasibility of this concept was verified
by simulation. Three different models for node mobility were
used in order to include realistic scenarios as well as make the
results comparable to other work. The simulation results include
an evaluation of the log-on times, availability, and communication
overhead.
Secure communication is very important in computer
networks and authentication is one of the most eminent
preconditions. However, common authentication schemes are not
applicable in ad hoc networks because public key infrastructures
with a centralized certification authority are hard to deploy
there. We propose and evaluate a security concept based on a
distributed certification facility. A network is divided into clusters
with one special head node each. These cluster head nodes execute
administrative functions and hold shares of a network key used
for certification. New nodes start to participate in the network
as guests; they can only become full members with a networksigned
certificate after their authenticity has been warranted by
some other members. The feasibility of this concept was verified
by simulation. Three different models for node mobility were
used in order to include realistic scenarios as well as make the
results comparable to other work. The simulation results include
an evaluation of the log-on times, availability, and communication
overhead.
'보안 > 일반' 카테고리의 다른 글
[본문스크랩] WSN - Sybil Attack (0) | 2007.07.06 |
---|---|
[Note] Diffie-Hellman Key Exchange (0) | 2007.07.06 |
[본문스크랩] Mesh Network 기술동향 및 Applications (0) | 2007.07.06 |
[본문스크랩] 센서 네트워크에서의 라우팅 프로토콜 (0) | 2007.07.06 |
[본문스크랩] ESN 키값 해킹 프로그램 인터넷 유통 (0) | 2007.07.06 |
공지사항
최근에 올라온 글
최근에 달린 댓글
- Total
- Today
- Yesterday
링크
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
TAG
- 매매가격지수
- PIR
- 주식
- 시스템트래이딩
- 주택구매력지수
- ElasticSearch
- 다올저축은행
- 사회간접자본
- 레고랜드
- 전세매매지수
- CriticalSection
- hai
- 실시간트래이딩
- systemd
- logrotate
- 공공인프라
- O365
- ROA
- 군함도
- 자동트래이딩
- INVOICE
- 미국주식
- ChatGPT
- SBI저축은행
- 피봇
- 신한저축은행
- 맥쿼리인프라
- 주식트래이딩
- ubuntu
- Pivot
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 | 31 |
글 보관함