Efficient Trust Authority Distribution in Tactical MANET Environments

Determining the efficiency of protocols in MANET environments depends heavily on accurate characterization of the operating environment, particularly of message complexity. In this paper we therefore describe an extensible group mobility model intended to capture platoon-level light infantry operations, characterized by a hierarchical set of evolutions. Movement in this model is further constrained by a terrain model reported in previous work, allowing for a more precise modeling and simulation of algorithms on tactical networks. We subsequently describe a mechanism for disseminating key revocation information across a distributed trust authority (TA) in which nodes may be compromised or exhibit Byzantine failure. We propose and evaluate key revocation mechanisms to optimize the requirements of fast revocation propagation, complete coverage, and low message complexity in the previously described modeling and simulation environment.

[1]  Siu-Ming Yiu,et al.  Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs) , 2005, ACM-SE 43.

[2]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[3]  Christian Bettstetter,et al.  Smooth is better than sharp: a random mobility model for simulation of wireless networks , 2001, MSWIM '01.

[4]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[5]  Dan Boneh,et al.  Identity-Based En ryption from the Weil Pairing , 2001 .

[6]  Louise E. Moser,et al.  An analysis of the optimum node density for ad hoc mobile networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[7]  Tracy Camp,et al.  Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.

[8]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[9]  박성현,et al.  NS-2를 이용한 네트워크 시뮬레이션 방법론 , 2007 .

[10]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[11]  Jörg Hähner,et al.  Graph-based mobility model for mobile ad hoc network simulation , 2002, Proceedings 35th Annual Simulation Symposium. SS 2002.

[12]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[13]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[14]  Bruce Lowekamp,et al.  A structured group mobility model for the simulation of mobile ad hoc networks , 2004, MobiWac '04.

[15]  S. Reidt,et al.  Efficient Distribution of Trust Authority Functions in Tactical Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[16]  Kevin C. Almeroth,et al.  Real-world environment models for mobile network evaluation , 2005, IEEE Journal on Selected Areas in Communications.

[17]  Atulya Mahajan,et al.  Mobility models for vehicular ad hoc network simulations , 2006, ACM-SE 44.

[18]  Guang Gong,et al.  Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks , 2006, ADHOC-NOW.

[19]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[20]  Feipei Lai,et al.  SWARM: Secure Wireless Ad-hoc network Reliance Management , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[21]  Stephen D. Wolthusen,et al.  An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments , 2007 .

[22]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[23]  Pedro José Marrón,et al.  Mobility modeling of outdoor scenarios for MANETs , 2005, 38th Annual Simulation Symposium.