Certification-based trust models in mobile ad hoc networks: A survey and taxonomy

A mobile ad hoc network is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in such network is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in trust models framework to securing mobile ad hoc networks. The majority of well-known approaches is based on public-key certificates, and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certificate authorities. In this paper, we survey and classify the existing trust models that are based on public-key certificates proposed for mobile ad hoc networks, and then we discuss and compare them with respect to some relevant criteria. Also, we have developed analysis and comparison among trust models using stochastic Petri nets in order to measure the performance of each one with what relates to the certification service availability.

[1]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[2]  Liviu Iftode,et al.  Locality driven key management architecture for mobile ad-hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[3]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[4]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[5]  Ivan Stojmenovic,et al.  Handbook of Wireless Networks and Mobile Computing , 2002 .

[6]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[7]  N. Vimala,et al.  Distributed Key Management Scheme for Mobile Ad-Hoc Network-A Survey , 2010 .

[8]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[9]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[10]  Philippe Jacquet,et al.  OLSR Performance Measurement in a Military Mobile Ad-hoc Network , 2004, ICDCS Workshops.

[11]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[12]  Yacine Challal,et al.  NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[13]  Shih-Lin Wu,et al.  Wireless Ad Hoc Networking : Personal-Area, Local-Area, and the Sensory-Area Networks , 2007 .

[14]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[15]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[16]  P.H.J. Chong,et al.  A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[17]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[18]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[19]  Bart Preneel,et al.  Authenticated and efficient key management for wireless ad hoc networks , 2003 .

[20]  David Bull,et al.  Proceedings of the Vehicular Technology Conference , 2000 .

[21]  Juan-Carlos Cano,et al.  A distributed admission control system for MANET environments supporting multipath routing protocols , 2007, Microprocess. Microsystems.

[22]  Weihong Wang,et al.  Self-managed heterogeneous certification in mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[23]  I. Sasase,et al.  On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[24]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[25]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[26]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[27]  Jordi Forné,et al.  Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks , 2007, Comput. Commun..

[28]  Alice Bob,et al.  The PGP Trust Model , 2005 .

[29]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[30]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[31]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[32]  I. Sasase,et al.  On Demand Distributed Public Key Management without Considering Routing Tables for Wireless Ad Hoc Networks , 2005, 6th Asia-Pacific Symposium on Information and Telecommunication Technologies.

[33]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[34]  Chin-Chen Chang,et al.  A robust certification service for highly dynamic MANET in emergency tasks , 2009 .

[35]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[36]  B. Aziz,et al.  A Recent Survey on Key Management Schemes in MANET , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[37]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[38]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey: Research Articles , 2006 .

[39]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[40]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey , 2006, Wirel. Commun. Mob. Comput..

[41]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[42]  Mehdi Dehghan,et al.  A secure credit-based cooperation stimulating mechanism for MANETs using hash chains , 2009, Future Gener. Comput. Syst..

[43]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[44]  Hiroyuki Seki,et al.  Certificate Chain Discovery in Web of Trust for Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[45]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[46]  R. Dorf,et al.  The handbook of ad hoc wireless networks , 2003 .

[47]  Iwao Sasase,et al.  Public key management scheme with certificate management node for wireless ad hoc networks , 2006 .

[48]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[49]  Siu-Ming Yiu,et al.  Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..

[50]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[51]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[52]  D. Toshniwal,et al.  Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks , 2006, 2006 International Conference on Hybrid Information Technology.

[53]  Yacine Challal,et al.  Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..

[54]  Marco Ajmone Marsan,et al.  Stochastic Petri nets: an elementary introduction , 1988, European Workshop on Applications and Theory in Petri Nets.

[55]  Erman Ayday,et al.  A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.

[56]  Georgios Kambourakis,et al.  Efficient Certification Path Discovery for MANET , 2010, EURASIP J. Wirel. Commun. Netw..

[57]  Yong Zhang,et al.  A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[58]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[59]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[60]  Patrick Th. Eugster,et al.  DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[61]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[62]  Peter J. Haas,et al.  Stochastic Petri Nets: Modelling, Stability, Simulation , 2002 .

[63]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[64]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[65]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[66]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..