Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network
Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-trivial security requirements. As the basis of security services, key management is essential for securing communication systems. In this paper, we address issues critical to key management in MANET. A Self-initialized Distributed Certificate Authority (SDCA) model which combines the advantages of two existing schemes, the Distributed Certificate Authority (DCA) scheme and Certificate Chain (CC) scheme, is proposed. In the proposed model, no trusted dealer or the pre-established trust relationships is required. Instead, entities in the MANET could collaborate to initialize the key management service on the fly. The simulation results illustrate that the proposed model will bring less communication, storage and computational overheads for maintaining and using the key management service than other self-organized key management schemes.
KeywordsMobile Node Communication Overhead Malicious Node Average Path Length Security Authority
Unable to display preview. Download preview PDF.
- 2.Ge, M., Lam, K.Y., Gollmann, D., Chung, S.L., Chang, C.C., Li, J.B.: A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks. International Journal of Communication Systems (to appear)Google Scholar
- 3.Yi, S., Kravets, R.: MOCA: Mobile certificate authority for wireless ad hoc networks. In: The 2nd Annual PKI Research Workshop (PKI 2003), pp. 65–79 (2003)Google Scholar
- 5.Ge, M., Lam, K.Y., Li, J.B., Chung, S.L.: Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008 (EUC 2008), pp. 312–317 (2008)Google Scholar
- 8.Yi, S., Kravets, R.: Composite key management for ad hoc networks. In: Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 52–61 (2004)Google Scholar
- 11.ns-2 simulator, http://nsnam.isi.edu/nsnam/index.php/Main_Page (February 12, 2008)
- 12.Le Boudec, J., Vojnovic, M.: Perfect simulation and stationarity of a class of mobility models. In: Proceedings - IEEE INFOCOM, pp. 2743–2754 (2005)Google Scholar
- 13.Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Proceedings - IEEE INFOCOM, pp. 1312–1321 (2003)Google Scholar
- 14.Perkins, C.: Ad hoc networking. Addison-Wesley, Reading (2001)Google Scholar