Abstract
Consider a network of interconnected nodes where each node is identified with a public key. Each node uses the corresponding private key to sign signalling messages. This allows those nodes that know a given node (by its public key) to verify the authenticity of the signalling messages. Under these circumstances, a node may delegate the right to send signalling messages to another node. The delegation may be expressed, for example, in the form of authorization certificates. In this paper we describe how such delegation could be used to optimise signalling paths in mobile and ad hoc network settings. Additionally, we consider the constraints and limitations of the proposed approach.
Original language | English |
---|---|
Title of host publication | SECURITY PROTOCOLS |
Publisher | Springer Verlag |
Pages | 203-214 |
Number of pages | 12 |
Volume | 2845 |
ISBN (Print) | 3-540-20830-5 |
Publication status | Published - 1 Dec 2003 |
MoE publication type | A4 Article in a conference publication |
Event | International Workshop on Security Protocols - Cambridge, United Kingdom Duration: 17 Apr 2002 → 19 Apr 2002 Conference number: 10 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Publisher | Springer Verlag |
ISSN (Print) | 0302-9743 |
Workshop
Workshop | International Workshop on Security Protocols |
---|---|
Country | United Kingdom |
City | Cambridge |
Period | 17/04/2002 → 19/04/2002 |