These can be carried out in different ways:
illegitimately, legitimately or by impersonation.
The illegitimate node attack is when a malicious
node joins the network with a fake ID and without
contacting the PKG. It will therefore not receive a
matching private key and will behave maliciously
when it joins the network. Any messages they send
however will be ignored as they will have no private
key to sign them. This attack can therefore be
prevented in IDPKE.
The legitimate node attack is more serious and it
happens when a node joins the network legitimately
but acts maliciously. It therefore contacts the PKG
and receives a legitimate ID and matching private
key but it behaves maliciously when it joins the
network by trying to flood the network with false
IDs (DoS) or by ignoring or forwarding on
false/modified IDs (MiM). The attack worsens if a
number of legitimate nodes decide to act together
and behave maliciously. If false information has
been transmitted by a legitimate node, it can be
defended against using neighbourhood monitoring in
both IDPKE and OPKM. An attack involving a
number of legitimate nodes acting together and
behaving maliciously cannot be defended against (in
both IDPKE and OPKM) as it would be impossible
to determine which information is correct or
incorrect.
The impersonation attack is when a malicious
node joins the network and masquerades as another
legitimate node in the network in order to modify
public information or flood the network with false
information. The OPKM approach does not prevent
such attacks outright. However, IDPKE can defend
against impersonation attacks. In IDPKE the
legitimate node has a matching private key and will
sign all outgoing messages with this key. A
malicious node will not be able to derive this key
and will not be able to contact the PKG for access to
the key as the PKG will only issue one private key
per node ID, therefore any unsigned outgoing
messages from this node will be ignored. It will also
not be able to decrypt any secure messages that have
been encrypted with that ID/public key. Hence
signing with the private key ensures the receiver that
the message definitely originated from the node with
the ID contained in the message and that the ID was
not modified.
6 CONCLUSIONS
By modifying a fully self organised certificate based
key management scheme to a partially self-
organised identity-based scheme, we have provided
a more complete solution for existing ID-based
schemes, allowing the use of different types of IDs
and more accessibility to different ad hoc scenarios
and applications. The proposed IDPKE protocol
improves on the certificate based schemes in terms
of security against impersonation attacks and in
terms of computation and communication overhead
making it more accessible to constrained devices.
REFERENCES
Bertoni, G.M., Chen, L., Fragneto, P., Harrison,
K.A., Pelosi, G., 2005. Computing Tate Pairing on
Smartcards. Available at http://www.st.com/stonline/
product/families/smartcard/ches2005_v4.pdf.
Boneh, D., Franklin, M., 2001. Identity-based
Encryption from the Weil Pairing, SIAM J. of Computing
Vol.32, No.3, pp.586-615, 2003. Extended Abstract in
Proceedings of Crypto 2001, vol.2139 of Lecture
Notes in Computer Science, pages 213-229, Springer-
Verlag, 2001.
Capkun, S., Hubaux, J.-P., Buttyan, L., 2003.
Self-Organized Public-Key Management for Mobile Ad
Hoc Networks, IEEE Transactions on Mobile
Computing, vol.2, no.1, 2003, pp.52-64.
Deng, H., Mukherjee, A., Agrawal, D.P., 2004.
Threshold and Identity Based Key Management and
Authentication for Wireless Ad Hoc Networks, ITCC.
Hoeper, K., Gong, G., 2004. Models of Authentications
in Ad Hoc Networks and Their Related Network
Properties, CACR technical report.
Hoeper, K., Gong, G., 2006. Bootstrapping Security in
Mobile Ad Hoc Networks Using Identity-Based Schemes
with Revocation,Waterloo Tech. Report.
Khalili, A., Katz, J., Arbaugh, W., 2003. Toward
Secure Key Distribution in Truly Ad Hoc Networks, 2003
Symposium on Applications & the Internet Workshops
(SAINT’03), IEEE Comp. Soc.
Li, X., Gordon, S., Slay, J., 2004. On Demand Public Key
Management for Wireless Ad Hoc Networks, Proc of the
Australian Telecommunication Networks &
Applications Conference, Australia, Dec 2004.
McGrath, C., Safdar, G., .McLoone, M., 2006. Novel
Authenticated Key Management Framework for Ad Hoc
Network Security,IEE Irish Signals and Systems
Conference, Dublin, June 28-30, 2006.
Zhou, L., Haas, Z., 1999. Securing Ad Hoc Networks,
IEEE Network Journal, vol.13, no.6, 1999, pp.24-30.
SECRYPT 2007 - International Conference on Security and Cryptography
170