Abstract
Community mesh networks have emerged rapidly in every metropolis around the world, however many of the security methods applied are counter-intuitive and usually disrupt the autonomous characteristics of the mesh nodes. In SOMA we present a structured Peer-to-Peer solution providing authentication service based on a scalable, self-organized and fully distributed Web-of-Trust. Our proposal is a hybrid Public Key Infrastructure build on top of Chord, allowing each agent to place its own trust policy while keeping the autonomous characteristics the nodes intact. Our goal is to create a large-scale authentication system for mesh networks without the need of a Trusted Third Party. We leave the decision of whom to trust in each agent independently taking advantage of the overlay to alleviate the shortcomings of traditional Web-of-Trust models. This is achieved by using the overlay as a meta-structure to infer trust relationships. The possible attacks and limitations of our proposal are also investigated and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AWMN: Athens Wireless Metropolitan Network, www.awmn.gr
Bicket, J., Aguayo, D., Biswas, S., Morris, R.: Architecture and Evaluation of an Unplanned 802.11b Mesh Network. In: 11th Annual International Conference on Mobile Computing and Networking (2005)
Zimmermann, P.: The Official PGP Users Guide. The MIT Press, Cambridge (1995)
Gnutella RFC v0.4, http://rfc-gnutella.sourceforge.net/index.html
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: ACM SIGCOMM Technical Conference (2001)
Shamir, A.: How to Share a Secret, vol. 22(11), pp. 612–613. ACM, New York (1979)
Zhou, L., Haas, Z.: Securing Ad-hoc Networks. IEEE Network 13(6), 24–30 (1999)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks. In: 9th International Conference on Network Protocols (ICNP) (November 2001)
Douceur, J.R.: The Sybil Attack. Springer, Microsoft Research, One Microsoft Way (2002)
Zhou, L., Schneider, F., Renesse, R.: COCA: A Secure Distributed Online Certification Aauthority. ACM Transactions on Computer Systems (TOCS) 20(4), 329–368 (2002)
Yi, S., Kravets, R.: Practical PKI for Ad-hoc Wireless Networks. Department of Computer Science. University of Illinois, USA (2001)
Yi, S., Kravets, R.: Key Management for Heterogeneous Ad-hoc Wireless Networks. In: 10th IEEE International Conference on Network Protocols (ICNP) (2002)
Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad-hoc Networks. In: 2nd Annual PKI Research Workshop (2003)
Capkun, S., Hubaux, J., Buttyn, L.: Mobility Helps Security in Ad-hoc Networks. In: Mobile Ad Hoc Networking and Computing (MobiHoc) (2003)
Capkun, S., Buttyn, L., Hubaux, J.: Self-organized Public-key Management for Mobile Ad-hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)
Capkun, S., Hubaux, J., Buttyn, L.: Mobility Helps Peer-to-Peer Security. IEEE Transactions on Mobile Computing 5(1), 43–51 (2006)
Kambourakis, G., Konstantinou, E., Gritzalis, S.: Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks. In: Proceedings of the ISWCS 2008 5th IEEE International Symposium on Wireless Communications Systems, Reykjavik, Iceland, pp. 687–692. IEEE, Los Alamitos (October 2008)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
Bobba, R.B., Eschenauer, L., Gligor, V., Arbaugh, W.: Global Telecommunications Conference, GLOBECOM 2003, December 1-5. IEEE, Los Alamitos (2003)
Aberer, K., Datta, A., Hauswirth, M.: A Decentralised Public Key Infrastructure for Customer-to-Customer E-commerce. International Journal of Business Process Integration and Management 1(1), 26–33 (2005)
Avramidis, A., Kotzanikolaou, P., Douligeris, C.: Embedding a Public Key Infrastructure into the Chord Overlay Network. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 354–361. Springer, Heidelberg (2007)
Watts, D.J., Strogatz, S.H.: Collective Dynamics of ’small-world’ Networks. Nature 393, 440–442 (1998) doi: 10.1038/30918
Open PGP November 2007/RFC 4880, http://tools.ietf.org/html/rfc4880
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Demertzis, F.F., Xenakis, C. (2011). SOMA: Self-Organised Mesh Authentication. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-22633-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22632-8
Online ISBN: 978-3-642-22633-5
eBook Packages: Computer ScienceComputer Science (R0)