Abstract
In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery in civilian ad hoc networks is proposed as an immediate application of this cryptographic primitive. Our protocol forces selfish nodes to cooperate and report actions honestly, thus enables our routing discovery protocol to resist selfish actions within our model.
Chapter PDF
Similar content being viewed by others
References
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: A Survey of Two Signature Aggregation Techniques. CryptoBytes 6(2) (2003)
Buttyán, L., Vajda, I.: Towards Provable Security for Ad Hoc Routing Protocols. In: 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004) Washington DC, USA, October 25 (2004)
Buttyán, L., Hubaux, J.P.: Enforcing service availability in mobile ad hoc WANs. In: IEEE/ACM Workshop on Mobile Ad hoc Networking and Computing (MobiHOC), Boston, MA (August 2000)
Buttyán, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile Ad hoc networks. ACM Journal for Mobile Networks (MONET), special issue on Mobile Ad hoc Networks (summer 2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: MOBICOM 2002, pp. 12–23 (2002)
Coron, J.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)
Jakobsson, M., Hubaux, J.P., Buttyan, L.: A micropayment scheme encouraging collaboration in multi-hop cellular networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 15–33. Springer, Heidelberg (2003)
Johnson, D.B., Malt, D.A.: Mobile Computing. In: Dynamic Source Routing in Ad hoc Wireless Networks, ch. 5. Kluwer Academic Publishers, Dordrecht (1996)
Kawauchi, K., Komano, Y., Ohta, K., Tada, M.: Probabilistic multi-signature schemes using a one-way trapdoor permutation. IEICE transactions on fundamentals E87-A(5), 1141–1153 (2004)
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from trapdoor one-way permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004)
Michiardi, P., Molva, R.: Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Proc. of CMS 2002 (2002)
Michiardi, P., Molva, R.: A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks. In: Proc. of WiOpt 2003. IEEE Computer Society, Los Alamitos (2003)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile Ad hoc networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking 2000, Boston, MA (August 2000)
Micali, S., Rivest, R.L.: Micropayments Revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 149–163. Springer, Heidelberg (2002)
Martinelli, F., Petrocchi, M., Vaccarelli, A.: Local management of credits and debits in mobile ad hoc networks. In: Conference on Communications and Multimedia Security, CMS 2004 (2004)
Zhu, H., et al.: Constructing Sequential Aggregate Signatures for Secure Wireless Routing Protocols. In: IEEE WCNC 2005, New Orleans, New Orleans, LA, USA, March 13–17, 2005 (2005)
Zhong, S., Chen, J., Yang, Y.R.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad hoc Networks. In: Proceedings of IEEE INFOCOM 2003, San Francisco, CA (April 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zhu, H., Bao, F., Li, T. (2005). Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds) Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552055_20
Download citation
DOI: https://doi.org/10.1007/11552055_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28791-9
Online ISBN: 978-3-540-31978-8
eBook Packages: Computer ScienceComputer Science (R0)