Risk management of digital certificates in ad hoc and P2P networks

被引:0
作者
Zhou, Tong
Harn, Lein
机构
来源
2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4 | 2008年
关键词
trust; risk; certificate; stranger; cluster;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In nonhierarchical Public Key Infrastructure (PKI), any user can be a Certificate Authority (CA) to issue digital certificates to other users. As there is no single root CA, it is difficult to check the validity of certificates issued by unknown CAs. It is very risky to trust them without in-depth analysis. How users issue certificates in the real world has not been studied. Solomon Asch's conformity experiment reveals that peoples' decisions are influenced by others. To reduce the risk of trusting malicious certificate issuers, we propose two novel methods, micro method and macro method, for users to make trust decisions based on the relationships among the CAs. They will improve the security in ad hoc networks and Peer-to-Peer (P2P) communications.
引用
收藏
页码:312 / 317
页数:6
相关论文
共 9 条
[1]  
[Anonymous], IEEE T KNOWLEDGE DAT
[2]  
[Anonymous], 2003, 6 DEGREES SCI CONNEC
[3]  
HUYNH TD, 2006, AUTONOMOUS AGENTS MU
[4]  
Josang A., 2006, 29 AUSTR COMP SCI C
[5]  
Levine J M, 1999, Pers Soc Psychol Rev, V3, P358, DOI 10.1207/s15327957pspr0304_5
[6]  
MA J, 2006, IEEE T SYSTEMS MAN A, V36
[7]  
ROLFE M, 2004, SOCIAL NETWORKS THRE
[8]  
Schank T., 2005, J GRAPH ALGORITHMS A, V9, P265, DOI [10.7155/jgaa.00108, DOI 10.7155/JGAA.00108]
[9]   On trust models and trust evaluation metrics for ad hoc networks [J].
Theodorakopoulos, G ;
Baras, JS .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :318-328