Skip to main content

Towards a Survivable Security Architecture for Ad-Hoc Networks

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2467))

Included in the following conference series:

Abstract

We present a security architecture for access control in ad-hoc networks of mobile electronic devices. Ad-hoc networks are formed on demand without support from pre-existing infrastructure such as central servers, security associations or CAs. Our architecture is fully distributed and based on groups and public-key certification. The goal is a survivable system that functions well even when network nodes fail and connections are only occasional. We identify some open problems in the optimal use of unreliable communications for security management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan and Philip Ginzboorg. Key-argeement in ad-hoc networks. Elsevier Preprint, 2000. To appear.

    Google Scholar 

  2. Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications, 18(4):628–640, April 2000.

    Google Scholar 

  3. Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology-EUROCRYPT’ 94, volume 950 of LNCS, pages 275–286, Perugia, Italy, May 1994. Springer.

    Chapter  Google Scholar 

  4. Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos Keromytis. The KeyNote trust-management system version 2. RFC 2704, IETF Network Working Group, September 1999.

    Google Scholar 

  5. Specification of the Bluetooth system, version 1.0b, 1999.

    Google Scholar 

  6. CCITT. Recommendation X.509, The Directory-Authentication Framework, volume VIII of CCITT Blue Book, pages 48–81. 1988.

    Google Scholar 

  7. Wenli Chen, Nitin Jain, and Suresh Singh. ANMP: ad hoc network management protocol. IEEE Journal on Selected Areas in Communication, 17(8):1506–1531, August 1999.

    Google Scholar 

  8. Yvo G. Desmedt. Threshold cryptography. European Transactions on Telecommunications, 5(4):449–457, July-August 1994.

    Google Scholar 

  9. Carl Ellison, Bill Franz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylönen. Simple public key certificate. Internet draft, July 1999. Work in progress.

    Google Scholar 

  10. Carl Ellison, Bill Franz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylönen. SPKI certificate theory. RFC 2693, IETF Network Working Group, September 1999.

    Google Scholar 

  11. IEEE Standards Board. 802 part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1997.

    Google Scholar 

  12. Anne-Marie Kermarrec, Laurent Massoulie, and Ayalvadi J. Ganesh. Reliable probabilistic communication in large-scale information dissemination systems. Technical Report MMSR-TR-2000-105, Microsoft Research, Cambridge, UK, October 2000.

    Google Scholar 

  13. Silja Mäki, Tuomas Aura, and Maarit Hietalahti. Robust membership management for ad-hoc groups. In Proc. 5th Nordic Workshop on Secure IT Systems (NORDSEC 2000), Reykjavik, Iceland, October 2000.

    Google Scholar 

  14. Ronald L. Rivest and Butler Lampson. SDSI-a simple distributed security infrastucture. Technical report, April 1996.

    Google Scholar 

  15. Gert Roelofsen. TETRA security-the fundament of a high performance system. In Proc. TETRA Conference 1997, 1997.

    Google Scholar 

  16. Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6), November-December 1999.

    Google Scholar 

  17. Philip Zimmermann. The Official PGP User’s Guide. MIT Press, June 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aura, T., Mäki, S. (2002). Towards a Survivable Security Architecture for Ad-Hoc Networks. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2001. Lecture Notes in Computer Science, vol 2467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45807-7_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-45807-7_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44263-9

  • Online ISBN: 978-3-540-45807-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics