Advertisement

On Trust Establishment in Mobile Ad-Hoc Networks

  • Laurent Eschenauer
  • Virgil D. Gligor
  • John Baras
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)

Abstract

We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. We argue that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile ad-hoc networks, and illustrate the importance of evaluation metrics in trust establishment.

Keywords

Mobile Node Swarm Intelligence Malicious Node Trust Establishment Trust Relation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Babaoglu, O., Meling, H., Montresor, A.: Anthill: A Framework for the Development of Agent-Based Peer-to-Peer System, Technical Report UBLCS-2001-09, University of Bologna, ItalyGoogle Scholar
  2. 2.
    Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proc. of the ISOC 2002 Network and Distributed Systems Security Symposium (February 2002)Google Scholar
  3. 3.
    Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875. Springer, Heidelberg (1994)Google Scholar
  4. 4.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164–173 (1996)Google Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for publickey infrastructures. In: Proc. Cambridge 1998 Security Protocols International Workshop, pp. 59–63 (1998)Google Scholar
  6. 6.
    Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute on the Sciences of Complexity. Oxford University Press, Oxford (July 1999)Google Scholar
  7. 7.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proc. of the International Computer Science Institute (ICSI) Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA (2000)Google Scholar
  8. 8.
    Common Criteria for Information Technology Security Evaluation – Part 3: Security Assurance Requirements, version 2.0, CCIB-98-028, National Institute of Standards and Technology (May 1998), http://niap.nist.gov
  9. 9.
    Gligor, V.D., Luan, S.-W., Pato, J.N.: On inter-realm authentication in large distributed systems. In: Proc. of the 1992 IEEE Symposium on Research in Security and Privacy (May 1992)Google Scholar
  10. 10.
  11. 11.
    Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: Proc. of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, pp. 2–14 (2000)Google Scholar
  12. 12.
    Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC 2001 (2001)Google Scholar
  13. 13.
    Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 93–112. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000) (November 2000)Google Scholar
  15. 15.
    Lampson, B.W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)CrossRefGoogle Scholar
  16. 16.
    Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)Google Scholar
  17. 17.
  18. 18.
    Reiter, M.K., Stubblebine, S.G.: Toward acceptable metrics of authentication. In: Proc. of the IEEE Conference on Security and Privacy, Oakland, CA (1997)Google Scholar
  19. 19.
    Reiter, M.K., Stubblebine, S.G.: Path independence for authentication in large-scale systems. In: Proc. of the 4th ACM Conference on Computer and Communications Security (April 1997)Google Scholar
  20. 20.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (1999)Google Scholar
  21. 21.
    Stajano, F.: The resurrecting duckling – What next? In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (April 2000)Google Scholar
  22. 22.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for Internet applications. In: Proc. of the 2001 ACM SIGCOMM Conference, San Diego, CA, pp. 149–160 (2001)Google Scholar
  23. 23.
    Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Transactions on Computer Systems 12(1), 3–32 (1994)CrossRefGoogle Scholar
  24. 24.
    Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems—A distributed authentication perspective. In: Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, May 1993, pp. 150–164 (1993)Google Scholar
  25. 25.
    Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995), http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-user.html Google Scholar
  26. 26.
    Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Laurent Eschenauer
    • 1
  • Virgil D. Gligor
    • 1
  • John Baras
    • 1
  1. 1.Electrical and Computer Engineering DepartmentUniversity of MarylandCollege ParkUSA

Personalised recommendations