Advertisement

Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network

  • Meng Ge
  • Kwok-Yan Lam
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)

Abstract

Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-trivial security requirements. As the basis of security services, key management is essential for securing communication systems. In this paper, we address issues critical to key management in MANET. A Self-initialized Distributed Certificate Authority (SDCA) model which combines the advantages of two existing schemes, the Distributed Certificate Authority (DCA) scheme and Certificate Chain (CC) scheme, is proposed. In the proposed model, no trusted dealer or the pre-established trust relationships is required. Instead, entities in the MANET could collaborate to initialize the key management service on the fly. The simulation results illustrate that the proposed model will bring less communication, storage and computational overheads for maintaining and using the key management service than other self-organized key management schemes.

Keywords

Mobile Node Communication Overhead Malicious Node Average Path Length Security Authority 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zhou, L.D., Zygmunt, J.H.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  2. 2.
    Ge, M., Lam, K.Y., Gollmann, D., Chung, S.L., Chang, C.C., Li, J.B.: A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks. International Journal of Communication Systems (to appear)Google Scholar
  3. 3.
    Yi, S., Kravets, R.: MOCA: Mobile certificate authority for wireless ad hoc networks. In: The 2nd Annual PKI Research Workshop (PKI 2003), pp. 65–79 (2003)Google Scholar
  4. 4.
    Luo, J., Hubaux, J.P., Eugster, P.T.: DICTATE: DIstributed cerTification authority with probabilisTic frEshness for ad hoc networks. IEEE Transactions on Dependable and Secure Computing 2(4), 311–323 (2005)CrossRefGoogle Scholar
  5. 5.
    Ge, M., Lam, K.Y., Li, J.B., Chung, S.L.: Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008 (EUC 2008), pp. 312–317 (2008)Google Scholar
  6. 6.
    Capkun, S., Buttyan, L., Hubaux, J.: Self Organized Public-key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)CrossRefGoogle Scholar
  7. 7.
    Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Transactions on Mobile Computing 5(1), 43–51 (2006)CrossRefGoogle Scholar
  8. 8.
    Yi, S., Kravets, R.: Composite key management for ad hoc networks. In: Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 52–61 (2004)Google Scholar
  9. 9.
    Van der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surverys 39(1), 3–45 (2007)CrossRefGoogle Scholar
  10. 10.
    Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  11. 11.
    ns-2 simulator, http://nsnam.isi.edu/nsnam/index.php/Main_Page (February 12, 2008)
  12. 12.
    Le Boudec, J., Vojnovic, M.: Perfect simulation and stationarity of a class of mobility models. In: Proceedings - IEEE INFOCOM, pp. 2743–2754 (2005)Google Scholar
  13. 13.
    Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Proceedings - IEEE INFOCOM, pp. 1312–1321 (2003)Google Scholar
  14. 14.
    Perkins, C.: Ad hoc networking. Addison-Wesley, Reading (2001)Google Scholar
  15. 15.
    Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Meng Ge
    • 1
    • 2
  • Kwok-Yan Lam
    • 1
  1. 1.Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science & Technology School of SoftwareTsinghua UniversityChina
  2. 2.Department of Computer Science & TechnologyTsinghua UniversityChina

Personalised recommendations