Skip to main content

SOMA: Self-Organised Mesh Authentication

  • Conference paper
Public Key Infrastructures, Services and Applications (EuroPKI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6711))

Included in the following conference series:

Abstract

Community mesh networks have emerged rapidly in every metropolis around the world, however many of the security methods applied are counter-intuitive and usually disrupt the autonomous characteristics of the mesh nodes. In SOMA we present a structured Peer-to-Peer solution providing authentication service based on a scalable, self-organized and fully distributed Web-of-Trust. Our proposal is a hybrid Public Key Infrastructure build on top of Chord, allowing each agent to place its own trust policy while keeping the autonomous characteristics the nodes intact. Our goal is to create a large-scale authentication system for mesh networks without the need of a Trusted Third Party. We leave the decision of whom to trust in each agent independently taking advantage of the overlay to alleviate the shortcomings of traditional Web-of-Trust models. This is achieved by using the overlay as a meta-structure to infer trust relationships. The possible attacks and limitations of our proposal are also investigated and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AWMN: Athens Wireless Metropolitan Network, www.awmn.gr

  2. Bicket, J., Aguayo, D., Biswas, S., Morris, R.: Architecture and Evaluation of an Unplanned 802.11b Mesh Network. In: 11th Annual International Conference on Mobile Computing and Networking (2005)

    Google Scholar 

  3. Zimmermann, P.: The Official PGP Users Guide. The MIT Press, Cambridge (1995)

    Google Scholar 

  4. Gnutella RFC v0.4, http://rfc-gnutella.sourceforge.net/index.html

  5. Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: ACM SIGCOMM Technical Conference (2001)

    Google Scholar 

  6. Shamir, A.: How to Share a Secret, vol. 22(11), pp. 612–613. ACM, New York (1979)

    MATH  Google Scholar 

  7. Zhou, L., Haas, Z.: Securing Ad-hoc Networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  8. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks. In: 9th International Conference on Network Protocols (ICNP) (November 2001)

    Google Scholar 

  9. Douceur, J.R.: The Sybil Attack. Springer, Microsoft Research, One Microsoft Way (2002)

    Google Scholar 

  10. Zhou, L., Schneider, F., Renesse, R.: COCA: A Secure Distributed Online Certification Aauthority. ACM Transactions on Computer Systems (TOCS) 20(4), 329–368 (2002)

    Article  Google Scholar 

  11. Yi, S., Kravets, R.: Practical PKI for Ad-hoc Wireless Networks. Department of Computer Science. University of Illinois, USA (2001)

    Google Scholar 

  12. Yi, S., Kravets, R.: Key Management for Heterogeneous Ad-hoc Wireless Networks. In: 10th IEEE International Conference on Network Protocols (ICNP) (2002)

    Google Scholar 

  13. Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad-hoc Networks. In: 2nd Annual PKI Research Workshop (2003)

    Google Scholar 

  14. Capkun, S., Hubaux, J., Buttyn, L.: Mobility Helps Security in Ad-hoc Networks. In: Mobile Ad Hoc Networking and Computing (MobiHoc) (2003)

    Google Scholar 

  15. Capkun, S., Buttyn, L., Hubaux, J.: Self-organized Public-key Management for Mobile Ad-hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  16. Capkun, S., Hubaux, J., Buttyn, L.: Mobility Helps Peer-to-Peer Security. IEEE Transactions on Mobile Computing 5(1), 43–51 (2006)

    Article  Google Scholar 

  17. Kambourakis, G., Konstantinou, E., Gritzalis, S.: Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks. In: Proceedings of the ISWCS 2008 5th IEEE International Symposium on Wireless Communications Systems, Reykjavik, Iceland, pp. 687–692. IEEE, Los Alamitos (October 2008)

    Chapter  Google Scholar 

  18. Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  19. Bobba, R.B., Eschenauer, L., Gligor, V., Arbaugh, W.: Global Telecommunications Conference, GLOBECOM 2003, December 1-5. IEEE, Los Alamitos (2003)

    Google Scholar 

  20. Aberer, K., Datta, A., Hauswirth, M.: A Decentralised Public Key Infrastructure for Customer-to-Customer E-commerce. International Journal of Business Process Integration and Management 1(1), 26–33 (2005)

    Article  Google Scholar 

  21. Avramidis, A., Kotzanikolaou, P., Douligeris, C.: Embedding a Public Key Infrastructure into the Chord Overlay Network. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 354–361. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Watts, D.J., Strogatz, S.H.: Collective Dynamics of ’small-world’ Networks. Nature 393, 440–442 (1998) doi: 10.1038/30918

    Article  Google Scholar 

  23. Open PGP November 2007/RFC 4880, http://tools.ietf.org/html/rfc4880

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Demertzis, F.F., Xenakis, C. (2011). SOMA: Self-Organised Mesh Authentication. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22633-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22632-8

  • Online ISBN: 978-3-642-22633-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics