effectiveness is compromised independently from the
number of misbehaving nodes, enforcing the neces-
sity of security mechanisms to reduce the impact of
Sybil attacks. Future work includes the development
of a key management scheme able to resist or even
reduce the impact of Sybil attacks.
REFERENCES
Agrawal, P., Ghosh, R. K., and Das, S. K. (2008). Co-
operative black and gray hole attacks in mobile
ad hoc networks. In Proc. of the 2nd Int. Conf. on
Ubiquitous Information Management and Com-
munication (ICUIMC ’08), pages 310–314.
Al-Shurman, M., Yoo, S.-M., and Park, S. (2004).
Black hole attack in mobile ad hoc networks. In
Proc. of the 42nd annual Southeastregional con-
ference (ACM-SE 42), pages 96–97.
Butty´an, L. and Hubaux, J.-P. (2003). Report on a
working session on security in wireless ad hoc
networks. Mobile Computing Communications
Review (SIGMOBILE), 7(1):74–94.
ˇ
Capkun, S., Butty´an, L., and Hubaux, J.-P. (2003).
Self-organized public-key management for mo-
bile ad hoc networks. IEEE Transactions on Mo-
bile Computing, 2(1):52–64.
ˇ
Capkun, S., Hubaux, J.-P., and Butty´an, L. (2006).
Mobility helps peer-to-peer security. IEEE
Transactions on Mobile Computing, 5(1):43–51.
Chlamtac, I., Conti, M., and Liu, J. J.-N. (2003). Mo-
bile ad hoc networking: imperatives and chal-
lenges. Ad Hoc Networks, 1(1):13–64.
Djenouri, D., Khelladi, L., and Badache, N. (2005).
A survey of security issues in mobile ad hoc and
sensor networks. IEEE Surveys and Tutorials,
7(4):2–28.
Douceur, J. R. (2001). The sybil attack. In Proc.
of the First International Workshop on Peer-to-
Peer Systems (IPTPS ’01), pages 251–260.
Engel, T., Fischer, D., Scherer, T., and Spiewak, D.
(2006). A survey on security challenges in next
generation mobile networks. In Proc. of The
Third Int. Conf. on Mobile Computing and Ubiq-
uitous Networking (ICMU’06).
Gouda, M. and Jung, E. (2004). Certificate disper-
sal in ad-hoc networks. In Proc. of the 24th
IEEE Int. Conf. on Distributed Computing Sys-
tems (ICDCS 04).
He, W., Huang, Y., Nahrstedt, K., and Lee, W. C.
(2007). Smock: A self-contained public key
management scheme for mission-critical wire-
less ad hoc networks. In Proc. of 5th IEEE Int.
Conf. on Pervasive Computing and Communica-
tions, pages 201–210.
Hegland, A. M., Winjum, E., Mjolsnes, S. F., Rong,
C., Kure, O., and Spilling, P. (2006). A survey
of key management in ad hoc networks. IEEE
Communications Surveys, 08(03):48–66.
Hubaux, J.-P., Butty´an, L., and
ˇ
Capkun, S. (2001).
The quest for security in mobile ad hoc net-
works. In Proc. of the 2nd ACM International
Symposium on Mobile Ad Hoc Networking &
computing (MobiHoc ’01), pages 146–155.
Michiardi, P. and Molva, R. (2003). Ad hoc networks
security. ST Journal of System Research, 4(1).
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon,
J., and Nygard, K. E. (2003). Prevention of coop-
erative black hole attack in wireless ad hoc net-
works. In Proc. of the Int. Conf. on Wireless Net-
works (ICWN ’03), pages 570–575.
van der Merwe, J., Dawoud, D., and McDonald, S.
(2007). A survey on peer-to-peer key manage-
ment for mobile ad hoc networks. ACM Com-
puting Survey, 39(1):1.
Wu, B., Wu, J., Fernandez, E. B., Ilyas, M., and
Magliveras, S. (2007). Secure and efficient
key management in mobile ad hoc networks.
Journal of Network and Computer Applications,
30(3):937–954.
Yi, S. and Kravets, R. (2004). Composite key man-
agement for ad hoc networks. In Proc. of The
First Annual Int. Conf. on Mobile and Ubiqui-
tous Systems: Networking and Services (Mobiq-
uitous’ 04), pages 52–61.
Zhang, Q., Wang, P., Reeves, D. S., and Ning, P.
(2005). Defending against sybil attacks in sensor
networks. In Proc. of the Second International
Workshop on Security in Distributed Computing
Systems (ICDCSW’05), pages 185–191.
Zimmermann, P. R. (1995). The official PGP user’s
guide. MIT Press, Cambridge, MA, USA.
QUANTIFYING MISBEHAVIOUR ATTACKS AGAINST THE SELF-ORGANIZED PUBLIC KEY MANAGEMENT
ON MANETS
135