Security Applications for Ad Hoc Networks

  • Antônio Carlos Castañon Vieira Exército Brasileiro / UFRJ
  • Sergio Luiz Cardoso Salomão Exército Brasileiro
  • Aloysio de Castro Pinto Pedrosa UFRJ
  • Antônio Carneiro de Mesquita Filho UFRJ

Resumo


Atualmente, segurança das informações é uma importante característica a ser considerada nos projetos e operações das redes de telecomunicações, sobretudo, nas redes sem fio e sem infra-estrutura como as redes Ad Hoc. Este artigo descreve o algoritmo criptográfico simétrico Godzuk, como um possível padrão para este tipo de comunicações móveis.

Referências

D. P. Agrawal, "Future directions in mobile computing and networking systems," Mobile Computing and Communications Review, Vol. Vol. 3, pp. 13-18, Oct 1999.

Z. J. Haas,L. Zhou, " Securing ad hoc networks," IEEE Network Magazine, vol. Vol13, nov/dec 1999.

Vieira, A.C.C. and Salomão, S. L. C. et al, "SCOB, A Soft-core for the Blowfish cryptographic algorithm" published in the proceedings of the XII Brazilian Symposium on Integrated Circuits, Oct 1999.

Salomão, S.L.C. et al "Hipcrypto: A high-performance VLSI cryptographic chip", published in the proceedings of the 11th Annual IEEE International Asic Conference (ASIC98), September 1998.

Anton, E. R. and Duarte, O. C. M. B. - "Group Key Establishment in Wireless Ad Hoc Networks", Workshop em Qualidade de Serviço e Mobilidade - WQoSM 2002, Angra dos Reis, RJ, Brazil, November 2002.

Specification of the Bluetooth System, version 1.1 February 2001, Official Bluetooth Website <http://www.bluetooth.com/>.

S. Corson, J. Macker: Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, 1999, <ftp://ftp.funet.fi/pub/standards/RFC/rfc2501.txt>

S. Corson, J. Macker, G. Cirincione: Internet-based Mobile Ad Hoc Networking, published in the IEEE Internet Computing, Jul/Aug 1999.

Barbosa, V., An Introduction to Distributed Algorithms. published in the MIT Press, 1996.

Salomão, S.L.C., "Architectures in Hardware to Cryptographic Accelerators", Doctor Thesis, COPPE/UFRJ, Rio de Janeiro, Brazil, 2000.

Salomão, S.L.C. et al, " Improved IDEA" published in the proceedings of the 13th Symposium on Integrated Circuits and System Design--SBCCI 2000, September 2000, Brazil.

Schneier, Bruce, "Applied Cryptography", Second Edition, John Wilwy & Sons inc., 1996.

Nyberg, K.: "Linear Approximation of Block Ciphers", published in the Proceedings of Eurocrypt'94. Springer-Verlag 1995.

Nyberg, K., Knudsen, L.: "Provable Security against Differential Cryptanalysis", published in the Journal of Cryptology, vol. 8, No.1, 1995.

Salomão, S.L.C., et al. "Hardware Implementation of KASUMI Cryptographic Algorithm for Third Generation Mobile Systems", published in the 1st IEEE South-American Workshop on Circuits and Systems - SAWCAS'2000, nov, 2000, Brazil

França, F.M.G. "Scheduling weightless systems with self-timed Boolean networks" published in the Workshop on Weightless Neural Network, April 1996.

Vieira, A.C.C. and Salomão, S. L. C. et al, "Godzuk Cryptographic Algorithm for 3rd Generation Mobile Systems" published in the proceedings of the IEEE International Telecommunications Symposium -ITS2002, Sep 2002.

M. Steiner, G. Tsudik e M. Waidner, "CLIQUES: A New Approach to Group Key Agreement", published in 18th International Conference on Distributed Computing Systems, may 1998.
Publicado
01/05/2003
Como Citar

Selecione um Formato
VIEIRA, Antônio Carlos Castañon; SALOMÃO, Sergio Luiz Cardoso; PEDROSA, Aloysio de Castro Pinto; MESQUITA FILHO, Antônio Carneiro de. Security Applications for Ad Hoc Networks. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 3. , 2003, Natal. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2003 . p. 64-71. DOI: https://doi.org/10.5753/sbseg.2003.21251.