DOI:
关键词: Phone 、 Cryptographic protocol 、 Cryptographic primitive 、 Engineering 、 Key distribution 、 Resource (project management) 、 Mobile device 、 Wireless mesh network 、 Computer security 、 Research center
摘要: Chapter 1 Non-Interactive Key Establishment in Wireless Mesh Networks Zhenjiang Li † , J.J. Garcia-Luna-Aceves {zhjli,jj}@soe.ucsc.edu Computer Engineering, University of California, Santa Cruz 1156 high street, Cruz, CA 95064, USA Phone:1-831-4595436, Fax: 1-831-4594829 Palo Alto Research Center (PARC) 3333 Coyote Hill Road, Alto, 94304, Symmetric cryptographic primitives are preferable designing security protocols for wireless mesh networks (WMNs) because they computationally affordable resource- constrained mobile devices forming a WMN. Most proposed key-establishment schemes symmetric cryptosystem assume services from centralized authority (either on-line or off- line), involve the interaction between communicating parties. However, requiring access Springer, c 2005. This is revision work published proceedings AdhocNow’05, LNCS 3738, pp. 164-177, Cancun, Mexico, Oct. 2 was supported part by Baskin Chair Engineering at UCSC, National Science Foundation under Grant CNS-0435522, U.S. Army Office grant No. W911NF-05-1-0246. Any opinions, findings, and conclusions those authors do not necessarily reflect views funding agencies.