Skip to main content

Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks

  • Conference paper
Mobile Networks and Management (MONAMI 2011)

Abstract

Cryptography is widely known as the best technique to provide security on data communications in all kinds of networks. Cryptographic methods rely on keys to perform their operations, such as encryption, decryption, and signature. In Wireless Ad Hoc Networks (WANETs), key management is a critical service as it must handle all security threats in a self-organized and decentralized way. Several kinds of attacks can compromise the key management on WANETs, such as Sybil and bad mouthing. This article presents the enhanced VKM, called e-VKM, a virtualization-based key management system resistant to Sybil and bad mouthing attacks. e-VKM is proposed to work on scenarios in which nodes can be preloaded with secure information before joining the system. Examples of these scenarios include but are not limited to sensor networks, meeting conferences, battlefield operations or health care solutions. Results show that e-VKM is highly resistant to Sybil attacks and bad mouthing, presenting 100% of resistance even under 20% of attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhang, C., Song, Y., Fang, Y.: Modeling secure connectivity of self-organized wireless ad hoc networks. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), pp. 251–255. IEEE Communications Society (2008)

    Google Scholar 

  2. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Surveys & Tutorials 7(4), 2–28 (2005)

    Article  Google Scholar 

  3. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Danvers (1996)

    Book  MATH  Google Scholar 

  4. van der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Survey 39(1), 1 (2007)

    Article  Google Scholar 

  5. Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), p. 342. IEEE Computer Society (2003)

    Google Scholar 

  6. Čapkun, S., Buttyán, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  7. Čapkun, S., Hubaux, J.P., Buttyán, L.: Mobility helps peer-to-peer security. IEEE Transactions on Mobile Computing 5(1), 43–51 (2006)

    Article  Google Scholar 

  8. Hubaux, J.P., Buttyán, L., Čapkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), pp. 146–155 (2001)

    Google Scholar 

  9. Ngai, E.C.H., Lyu, M.R.: Trust- and clustering-based authentication services in mobile ad hoc networks. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW 2004), pp. 582–587. IEEE Computer Society (2004)

    Google Scholar 

  10. Ngai, E.C.H., Lyu, M.R., Chin, R.T.: An authentication service against dishonest users in mobile ad hoc networks. In: Aerospace Conference 2004, vol. 02, pp. 1275–1285. IEEE (2004)

    Google Scholar 

  11. Čapkun, S., Hubaux, J.P., Buttyán, L.: Mobility helps security in ad hoc networks. In: MobiHoc 2003: Proceedings of the 4th ACM International Symposium on Mobile ad hoc Networking & Computing, pp. 46–56. ACM Press (2003)

    Google Scholar 

  12. e Silva, R.F., da Silva, E., Albini, L.C.P.: Resisting impersonation attacks in chaining-based public-key management on manets: the virtual public key management. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), pp. 155–158. INSTICC (2009)

    Google Scholar 

  13. Nogueira, M., Pujolle, G., da Silva, E., dos Santos, A., Albini, L.C.P.: Survivable keying for wireless ad hoc networks. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2009), pp. 606–613. IEEE Communications Society (2009)

    Google Scholar 

  14. Zimmermann, P.R.: The official PGP user’s guide. MIT Press, Cambridge (1995)

    Google Scholar 

  15. da Silva, E., Lima, M.N., dos Santos, A.L., Albini, L.C.P.: Quantifying misbehaviour attacks against the self-organized public key management on manets. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), pp. 128–135. INSTCC Press, Porto (2008)

    Google Scholar 

  16. da Silva, E., Lima, M.N., dos Santos, A.L., Albini, L.C.P.: Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks. CCIS, vol. 48, pp. 166–179. Springer, Heidelberg (2009)

    Google Scholar 

  17. Boldyreva, A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  19. Dellarocas, C.: Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In: Proceedings of the 21th International Conference on Information Systems (ICIS 2000), pp. 520–525. Association for Information Systems, Atlanta (2000)

    Google Scholar 

  20. Michiardi, P., Molva, R.: Ad hoc networks security. ST Journal of System Research 4(1) (March 2003)

    Google Scholar 

  21. da Silva, E., Lima, M.N., dos Santos, A.L., Albini, L.C.P.: Identity-based key management in mobile ad hoc networks: techniques and applications. IEEE Wireless Communications Magazine 15 (2008)

    Google Scholar 

  22. Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in ad hoc networks. In: Proceeding of the IEEE/ACM International Conference on Security and Privacy in Communication Networks (SecureComm 2006), pp. 1–11. ACM (Augut 2006)

    Google Scholar 

  23. Wang, S.J., Tsai, Y.R., Chen, C.W.: Strategies averting Sybil-type attacks based on the Blom-scheme in ad hoc sensor networks. Journal of Communications (JCM) 3(1), 20–26 (2008)

    MathSciNet  Google Scholar 

  24. Zhang, Q., Wang, P., Reeves, D.S., Ning, P.: Defending against sybil attacks in sensor networks. In: Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW 2005), pp. 185–191. IEEE Computer Society, Washington, DC (2005)

    Google Scholar 

  25. Christianson, B.: Why isn’t trust transitive. In: Proceedings of the International Workshop on Security Protocols (WSP 1996). IEEE Computer Society (1996)

    Google Scholar 

  26. Albini, L.C.P., Caruso, A., Chessa, S., Maestrini, P.: Reliable routing in wireless ad hoc networks: the virtual routing protocol. Journal of Network and Systems Management 14(3), 335–358 (2006)

    Article  Google Scholar 

  27. Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  28. Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

da Silva, E., e Silva, R.F., Albini, L.C.P. (2012). Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks. In: Pentikousis, K., Aguiar, R., Sargento, S., Agüero, R. (eds) Mobile Networks and Management. MONAMI 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 97. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30422-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30422-4_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30421-7

  • Online ISBN: 978-3-642-30422-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics