Recent Changes - Search:


edit SideBar


PhD in the areo of secure wireless and ad hoc communication

The applicant will work on security and reliability, with three main objectives:

  • Identify cryptographic mechanisms and protocols that are applicable to wireless and especially ad hoc networking;
  • Design security architecture suitable for use in wireless and ad hoc networking;
  • Simulate and possibly implement the proposed mechanisms and architecture.

Background and State-of-the-art

Refer to aforementioned general background for Wi-Fi security and ad hoc networks. Elliptic curve cryptography (ECC) is an approach to public-key cryptography that relies on the widely believed difficulty in solving the discrete logarithm problem for the group of an elliptic curve over some finite field. The main benefit of ECC is that under certain situations it uses smaller keys than other methods - such as RSA - while providing an equivalent or higher level of security. ECC is especially attractive for small devices, since to obtain a given level of security elliptic curve based algorithms typically require much less storage and processing than algorithms based on integers in a finite field. Another benefit of ECC is that a bilinear map between groups can be defined, based on the Weil pairing or the Tate pairing; bilinear maps have recently found numerous applications in cryptography, for example identity-based encryption (IBE). IBE allows for a party to encrypt a message using the recipient’s identity as a public key, avoiding the need to distribute public key certificates. This can be very useful in applications such as email where the recipient is often off-line and unable to present a public-key certificate while the sender encrypts a message. The first efficient and secure method for IBE was put forth by Boneh and Franklin [3] in 2001, and it was shown to be secure in the random oracle model. Only until this year, the first efficient IBE scheme that is fully secure without random oracles is presented by Waters. The research on applying these new techniques to wireless and ad hoc communications is a recent focus.

Edit - History - Print - Recent Changes - Search
Page last modified on January 05, 2006, at 10:40 AM EST