Survivable Keying for Wireless Ad Hoc Networks

被引:1
作者
Nogueira, Michele [1 ]
Pujolle, Guy [1 ]
Silva, Eduardo [2 ]
Santos, Aldri [2 ]
Albini, Luiz [2 ]
机构
[1] Univ Paris 06, LIP6, UNIVERSITAS, F-75016 Paris, France
[2] Univ Fed Parana, Dept Informat, BR-81531 Curitiba, Parana, Brazil
来源
2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2 | 2009年
关键词
MANAGEMENT;
D O I
10.1109/INM.2009.5188868
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic techniques are at the center of security solutions for wireless ad hoc networks. Public key infrastructures (PKIs) are essential for their efficient operation. However, the fully distributed organization of these networks makes a challenge to design PKIs. Moreover, changes in network paradigms and the increasing dependency on technology require more dependable, survivable and scalable PKIs. This paper presents a survivable PKI whose goal is to preserve key management operations even in face or attacks or intrusions. Our PKI is based on the adaptive cooperation among preventive, reactive and tolerant defense lines. It employs different evidences to prove the liability of users for their keys as well as social relationships for helping public key exchanges. Simulation results show the improvements achieved by our proposal in terms of effectiveness and survivability to different attacks.
引用
收藏
页码:606 / +
页数:2
相关论文
共 23 条
  • [1] [Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
  • [2] BESSANI AN, 2008, IEEE SECURI IN PRESS, V6
  • [3] Self-organized public-key management for mobile ad hoc networks
    Capkun, S
    Buttyán, L
    Hubaux, JP
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) : 52 - 64
  • [4] Key management for long-lived sensor networks in hostile environments
    Chorzempa, Michael
    Park, Jung-Min
    Eltoweissy, Mohamed
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (09) : 1964 - 1979
  • [5] Characterization of complex networks: A survey of measurements
    Costa, L. Da F.
    Rodrigues, F. A.
    Travieso, G.
    Boas, P. R. Villas
    [J]. ADVANCES IN PHYSICS, 2007, 56 (01) : 167 - 242
  • [6] A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS
    Djenouri, Djamel
    Khelladi, Lyes
    Badache, Nadjib
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04): : 2 - 28
  • [7] Spontaneous networking: An application-oriented approach to ad hoc networking
    Feeney, LM
    Ahlgren, B
    Westerlund, A
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (06) : 176 - 181
  • [8] In search of dependable design
    Hoffman, Leah
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (07) : 14 - 16
  • [9] LIMA MN, 2008, IEEE GLOBEC IN PRESS
  • [10] Maurer U., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P325