A localized certificate revocation scheme for mobile ad hoc networks

Ad Hoc Networks - Tập 6 - Trang 17-31 - 2008
Geneviève Arboit1, Claude Crépeau1, Carlton R. Davis1, Muthucumaru Maheswaran1
1School of Computer Science, McGill University, 3480 University Street, Montréal, Que., Canada H3A2A7

Tài liệu tham khảo

F. Stajano, R.J. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, in: Proceedings of the 7th International Workshop on Security Protocols, 2000, pp. 172–194. N. Shankar, D. Balfanz, Enabling secure ad-hoc communication using contextaware security services, in: Proceedings of Workshop on Security in Ubiquitous Computing (4 UBICOMP), 2002. Shamir, 1979, How to share a secret?, Communications of the ACM, 22, 612, 10.1145/359168.359176 B. Chor, S. Goldwasse, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: Proceedings of 26th IEEE Annual Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383–395. P. Feldman, A practical scheme for non-interactive verifiable secret sharing, in: Proceedings of 28th IEEE Symposium on Foundations of Foundations of Computer Science, 1987, pp. 427–437. Pedersen, 1991, Non-interactive and information-theoretic secure verifiable secret sharing, vol. 576, 129 Shoup, 2000, Practical threshold signatures, vol. 1807, 207 Gennaro, 1996, Robust threshold DSS signatures, vol. 1070, 354 Zhou, 1999, Securing ad hoc networks, IEEE Network Magazine, 13, 24, 10.1109/65.806983 J. Kong, H. Luo, K. Xu, D.L. Gu, M. Gerla, S. Lu, Adaptive security for multi-layer ad-hoc networks, in: Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press, 2002. B. Lehane, L. Doyle, D. O’Mahony, Shared rsa key generation in a mobile ad hoc network, in: Proceedings of IEEE Military Communications Conference (MILCOM 2003), 2003, pp. 814–819. A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings of 2003 Symposium on Applications and the Internet Workshops, 2003, pp. 342–346. S. Yi, R. Kravits, Composite key management for ad hoc networks, in: Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), 2004, pp. 52–61. G. Xu, L. Iftode, Locality driven key management architecture for mobile ad-hoc networks, in: Proceedings for the 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004. H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC’02), 2002, pp. 567–574. J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad hoc networks, in: Proceedings of the 9th International Conference on Network Protocols (ICNP), 2001, pp. 251–260. S. Chokhani, W. Ford, R. Sabett, C. Merrill, Internet X.509 public key infrastructure certificate policy and certification practices framework, Internet Request for Comments (RFC 3647), November 2003. Zimmermann, 1995 Capkun, 2003, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, 2, 52, 10.1109/TMC.2003.1195151 J.-P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), 2001, pp. 146–155. R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, Internet Request for Comments (RFC 3280), April 2002. M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 internet public key infrastructure online certificate status protocol – OCSP, Internet Request for Comments (RFC 2560), June 1999. L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, 2000, pp. 1268–1273. A. Weimerskirch, D. Westhoff, Identity certified authentication for ad-hoc networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN’03), 2003, pp. 33–40. T.S. Messerges, J. Cukier, T.A.M. Kevenaar, L. Puhl, R. Struik, E. Callaway, A security design for a general purpose, self-organizing, multihop ad hoc wireless network, in: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 1–11. S.L. Keoh, E. Lupu, M. Sloman, PEACE: a policy-based establishment of ad-hoc communities, in: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004, pp. 386–395. M.C. Morogan, S. Muftic, Certificate management in ad hoc networks, in: Symposium on Applications and the Internet Workshops (SAINT 2003), 2003, pp. 337–341. R.R.S. Verma, D. O’Mahony, H. Tewari, Progressive authentication in ad hoc networks, in: Proceedings of the Fifth European Wireless Conference, 2004. C. Candolin, H. Kari, A security architecture for wireless ad hoc networks, in: Proceedings of IEEE Milcom 2002, 2002. C. Crépeau, C.R. Davis, A certificate revocation scheme for wireless ad hoc networks, in: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), 2003, pp. 54–61. C.R. Davis, A localized trust management scheme for ad hoc networks, in: 3rd International Conference on Networking (ICN’04), 2004, pp. 671–675. S. Buchegger, J. Le Boudec, Performance analysis of the CONFIDANT protocol, in: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc’02), 2002, pp. 226–236. Resnick, 2000, Reputation systems, Communications of the ACM, 43, 45, 10.1145/355112.355122 J. Schneider, G. Kortuem, J. Jager, S. Fickas, Z. Segall, Disseminating trust information in wearable communities, in: Proceedings of 2nd International Symposium on Handheld and Ubitquitous Computing, 2000. L. Page, S. Brin, R. Motwani, T. Winograd, The pagerank citation ranking: bringing order to the web, in: 7th International World Wide Web Conference (WWW Consortium), 1998, pp. 161–172. S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in: Proceedings of the Twelfth International World Wide Web Conference, 2003. L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: IEEE Conference on ECommerce (CEC’03), 2003, pp. 275–284. M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2003. C.Y. Liau, X. Zhou, S. Bressan, K.-L. Tan, Efficient distributed reputation scheme for peer-to-peer systems, in: Proceedings of the 2nd International Human.Society@Internet, 2003, pp. 54–63. T.D. Huynh, N.R. Jennings, N.R. Shadbolt, Fire: an integrated trust and reputation model for open multi-agent systems, in: Proceedings of the 16th European Conference on Artificial Intelligence (ECAI), 2004, pp. 18–20. B. Yu, M.P. Singh, A social mechanism of reputation management in electronic communities, in: Proceedings of the 4th International Workshop on Cooperative Information Agents, 2000, pp. 154–165. A. Abdul-Rahman, S. Hailes, Supporting trust in virtual communities, in: Proceedings of Hawaii International Conference on System Sciences HICSS, 2000. K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in: Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01), 2001, pp. 310–317. Q. Zhang, T. Yu, K. Irwin, A classification scheme for trust functions in reputation-based trust management, in: Proceedings of ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004. J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, M. Gerla, A secure ad-hoc routing approach using localized self-healing communities, in: Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc’05), 2005, pp. 254–265. Lamport, 1981, Password authentication with insecure communication, Communications of the ACM, 24, 770, 10.1145/358790.358797 N.I. of Standards, Technology, Secure hash standard, Federal Information Processing Standards Publications (FIPS PUBS) 180-1, April 1995. R.L. Rivest, The md5 message-digest algorithm, Internet Request for Comments (RFC 1321), April 1992. H. Krawczyk, M. Bellare, R. Canetti, Hmac: Keyed-hashing for message authentication, Internet Request for Comments (RFC 2104), February 1997. Perrig, 2002, The tesla broadcast authentication protocol, Cryptobytes (RSA Laboratories, Summer/Fall 2002), 5, 2 Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), 2003, pp. 135–147. H. Deng, Q.-A. Zeng, D.P. Agrawal, Svm-based intrusion detection system for wireless ad hoc networks, in: Proceedings of the IEEE 58th Vehicular Technology Conference (VTC 2003-Fall), 2003, pp. 2147–2151.