Skip to main content

Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network

  • Conference paper
Advances in Information Security and Assurance (ISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Included in the following conference series:

Abstract

Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-trivial security requirements. As the basis of security services, key management is essential for securing communication systems. In this paper, we address issues critical to key management in MANET. A Self-initialized Distributed Certificate Authority (SDCA) model which combines the advantages of two existing schemes, the Distributed Certificate Authority (DCA) scheme and Certificate Chain (CC) scheme, is proposed. In the proposed model, no trusted dealer or the pre-established trust relationships is required. Instead, entities in the MANET could collaborate to initialize the key management service on the fly. The simulation results illustrate that the proposed model will bring less communication, storage and computational overheads for maintaining and using the key management service than other self-organized key management schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L.D., Zygmunt, J.H.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  2. Ge, M., Lam, K.Y., Gollmann, D., Chung, S.L., Chang, C.C., Li, J.B.: A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks. International Journal of Communication Systems (to appear)

    Google Scholar 

  3. Yi, S., Kravets, R.: MOCA: Mobile certificate authority for wireless ad hoc networks. In: The 2nd Annual PKI Research Workshop (PKI 2003), pp. 65–79 (2003)

    Google Scholar 

  4. Luo, J., Hubaux, J.P., Eugster, P.T.: DICTATE: DIstributed cerTification authority with probabilisTic frEshness for ad hoc networks. IEEE Transactions on Dependable and Secure Computing 2(4), 311–323 (2005)

    Article  Google Scholar 

  5. Ge, M., Lam, K.Y., Li, J.B., Chung, S.L.: Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008 (EUC 2008), pp. 312–317 (2008)

    Google Scholar 

  6. Capkun, S., Buttyan, L., Hubaux, J.: Self Organized Public-key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  7. Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Transactions on Mobile Computing 5(1), 43–51 (2006)

    Article  Google Scholar 

  8. Yi, S., Kravets, R.: Composite key management for ad hoc networks. In: Proceedings of MOBIQUITOUS 2004 - 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 52–61 (2004)

    Google Scholar 

  9. Van der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surverys 39(1), 3–45 (2007)

    Article  Google Scholar 

  10. Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  11. ns-2 simulator, http://nsnam.isi.edu/nsnam/index.php/Main_Page (February 12, 2008)

  12. Le Boudec, J., Vojnovic, M.: Perfect simulation and stationarity of a class of mobility models. In: Proceedings - IEEE INFOCOM, pp. 2743–2754 (2005)

    Google Scholar 

  13. Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Proceedings - IEEE INFOCOM, pp. 1312–1321 (2003)

    Google Scholar 

  14. Perkins, C.: Ad hoc networking. Addison-Wesley, Reading (2001)

    Google Scholar 

  15. Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ge, M., Lam, KY. (2009). Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics