Abstract
We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. We argue that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile ad-hoc networks, and illustrate the importance of evaluation metrics in trust establishment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Babaoglu, O., Meling, H., Montresor, A.: Anthill: A Framework for the Development of Agent-Based Peer-to-Peer System, Technical Report UBLCS-2001-09, University of Bologna, Italy
Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proc. of the ISOC 2002 Network and Distributed Systems Security Symposium (February 2002)
Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875. Springer, Heidelberg (1994)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164–173 (1996)
Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for publickey infrastructures. In: Proc. Cambridge 1998 Security Protocols International Workshop, pp. 59–63 (1998)
Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute on the Sciences of Complexity. Oxford University Press, Oxford (July 1999)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proc. of the International Computer Science Institute (ICSI) Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA (2000)
Common Criteria for Information Technology Security Evaluation – Part 3: Security Assurance Requirements, version 2.0, CCIB-98-028, National Institute of Standards and Technology (May 1998), http://niap.nist.gov
Gligor, V.D., Luan, S.-W., Pato, J.N.: On inter-realm authentication in large distributed systems. In: Proc. of the 1992 IEEE Symposium on Research in Security and Privacy (May 1992)
Gnutella, http://www.gnutellanews.com/
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: Proc. of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, pp. 2–14 (2000)
Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC 2001 (2001)
Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 93–112. Springer, Heidelberg (2000)
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000) (November 2000)
Lampson, B.W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)
Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)
Napster, http://www.napster.com
Reiter, M.K., Stubblebine, S.G.: Toward acceptable metrics of authentication. In: Proc. of the IEEE Conference on Security and Privacy, Oakland, CA (1997)
Reiter, M.K., Stubblebine, S.G.: Path independence for authentication in large-scale systems. In: Proc. of the 4th ACM Conference on Computer and Communications Security (April 1997)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (1999)
Stajano, F.: The resurrecting duckling – What next? In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (April 2000)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for Internet applications. In: Proc. of the 2001 ACM SIGCOMM Conference, San Diego, CA, pp. 149–160 (2001)
Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Transactions on Computer Systems 12(1), 3–32 (1994)
Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems—A distributed authentication perspective. In: Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, May 1993, pp. 150–164 (1993)
Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995), http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-user.html
Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Eschenauer, L., Gligor, V.D., Baras, J. (2004). On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive