RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management
Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini
2009
Abstract
Chaining-based key management schemes seem to be the ones that best fitMANETs. The main chaining-based scheme is the Self-Organized Public Key Management System (PGP-Like). However, it is fully vulnerable to impersonation attacks. In order to reduce such vulnerability, this article introduces a new public-key management system for MANETs, the Virtual Key Management System (VKM). VKM uses a virtual structure to indicate the trust between nodes and the certificate chains formation. VKM can behave in a restrict way, being able to tolerate impersonation attacks to a certain level, or it can behave similarly to the PGP-Like, just by changing a simple parameter. Thus, VKM can suit any user needs switching between these two models dynamically, without any network reinitialization or reconfiguration.
References
- Albini, L., Caruso, A., Chessa, S., and Maestrini, P. (2006). Reliable routing in wireless ad hoc networks: The virtual routing protocol. Journal of Network and Systems Management, 14(3):335- 358.
- C? apkun, S., Buttyán, L., and Hubaux, J.-P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1):52-64.
- Djenouri, D., Khelladi, L., and Badache, N. (2005). A survey of security issues in mobile ad hoc and sensor networks. IEEE Surveys and Tutorials, 7(4):2-28.
- Hubaux, J.-P., Buttyán, L., and C? apkun, S. (2001). The quest for security in mobile ad hoc networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & computing (MobiHoc 2001), pages 146-155.
- NS-2 (2007). The network simulator - ns-2.
- Robba, A. and Maestrini, P. (2007). Routing in mobile ad-hoc networks: The virtual distance vector protocol. In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2007), pages 1-9.
- Silva, E., dos Santos, A. L., Albini, L. C. P., and Lima, M. N. (2008). Quantify misbehavior attacks against the self-organized public key management on manets. In Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), pages 128-135.
- Zimmermann, P. R. (1995). The official PGP user's guide. MIT Press, Cambridge, MA, USA.
Paper Citation
in Harvard Style
Fischer e Silva R., da Silva E. and Carlos Pessoa Albini L. (2009). RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 155-158. DOI: 10.5220/0002236501550158
in Bibtex Style
@conference{secrypt09,
author={Renan Fischer e Silva and Eduardo da Silva and Luiz Carlos Pessoa Albini},
title={RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={155-158},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002236501550158},
isbn={978-989-674-005-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management
SN - 978-989-674-005-4
AU - Fischer e Silva R.
AU - da Silva E.
AU - Carlos Pessoa Albini L.
PY - 2009
SP - 155
EP - 158
DO - 10.5220/0002236501550158