5 Conclusions
The application of the Multipoint Relay Technique in the process of building the up-
dated certificate repository has been evaluated in the present work. For the assessment
of this alternative several experiments over an implementation developed in JAVA have
been carried out. According to these experiments the alternative presented outperforms
the original one in several aspects. Probably the more relevant are the significantly
higher certificate rate included in the repository when applying the MP R-based method
as well as the generation of shorter chains. This first characteristic results in less inter-
action among nodes at the time of building an authentication chain. The second fact
leads to a more efficient verification procedure.
Our immediate goal is to adapt the implementation developed to the network simu-
lator NS2 in order evaluate the behaviour of the method with different mobility models.
References
1. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Networks, 13 (1999) 24–30
2. Narasimha, M., Tsudik, G., Yi, J.: On the utility of distributed cryptography in P2P and
MANETs: The case of membership control. In: Proceedings of the 11th IEEE International
Conference on Network Protocols (ICNP’03), IEEE (2003) 336–345
3. Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks.
Technical Report TR-200030, Dept. of Computer Science, UCLA (2000)
4. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security sup-
port for mobile ad-hoc networks. In: International Conference on Network Protocols (ICNP).
(2001) 251–260
5. Haerri, J., Filali, F., Bonne, C.: Performance comparison of AODV and OLSR in VANETs ur-
ban environments under realistic mobility patterns. In: Med-Hoc-Net 2006, 5th IFIP Mediter-
ranean Ad-Hoc Networking Workshop, Lipari, Italy (2006)
6. Ni, S.Y., Tseng, Y.C., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad
hoc network. In: MobiCom ’99: Proceedings of the 5th annual ACM/IEEE international
conference on Mobile computing and networking, New York, NY, USA, ACM (1999) 151–
162
7. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public key management for mobile ad
hoc networks. Mobile Computting and Communication Review, 6 (2002)
8. Capkun, S., Buttyan, L., Hubaux, J.P.: Small worlds in security systems: an analysis of the
PGP certificate graph. In: Proceedings of The ACM New Security Paradigms Workshop 2002,
Norfolk, Virginia Beach, USA (2002) 8
9. Kleinberg, J.: The small-world phenomenon: An algorithmic perspective. In: Proceedings of
the 32nd ACM Symposium on Theory of Computing. (2000)
110