This paper is concerned with authenticated communication using public keys, which has been designed to minimize the potential for denial-of-service attacks in an ad-hoc network. To this aim, we use substantial hardware support and require certain properties from the network. We show how communication partners acquire public keys and how keys can be revoked and changed. We consider various attacks and analyze their effect on our system. It turns out that we can diminish the attack possibilities, but cannot completely protect our system from denial-of-service attacks due to its ad-hoc nature.