Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks

Wireless ad hoc networks (WANETs) offer communications over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in self-organized WANETs is more challenging than in conventional networks due to the lack of central authorities. In this paper, we propose a generic model to evaluate the relationship of connectivity, memory size, communication overhead and security in fully self-organized WANETs. Based on some reasonable assumptions on node deployment and mobility, we show that when the average number of authenticated neighbors of each node is Theta(1), with respect to the network size n, most of the nodes can be securely connected, forming a connected secure backbone, i.e., the secure network percolates. This connected secure backbone can be utilized to break routing-security dependency loop, and provide enough derived secure links connecting isolated nodes with the secure backbone in a multi-hop fashion, which leads to the secure connectivity of the whole network.

[1]  E. N. Gilbert,et al.  Random Plane Networks , 1961 .

[2]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[4]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[5]  Bengt Ahlgren,et al.  Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..

[6]  Mathew D. Penrose,et al.  Random Geometric Graphs , 2003 .

[7]  Béla Bollobás,et al.  Continuum percolation with steps in the square or the disc , 2005, Random Struct. Algorithms.

[8]  R. Meester,et al.  Continuum percolation: References , 1996 .

[9]  Svante Janson,et al.  Random graphs , 2000, ZOR Methods Model. Oper. Res..

[10]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[11]  William A. Arbaugh,et al.  Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[12]  Deep Medhi,et al.  Modeling pairwise key establishment for random key predistribution in large-scale sensor networks , 2007, TNET.

[13]  Svante Janson,et al.  Random graphs , 2000, Wiley-Interscience series in discrete mathematics and optimization.

[14]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[15]  Ness B. Shroff,et al.  Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility , 2006, IEEE Transactions on Information Theory.

[16]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Béla Bollobás,et al.  Random Graphs , 1985 .

[19]  Eytan Modiano,et al.  Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.

[20]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[21]  Johann van der Merwe,et al.  Fully self-organized peer-to-peer key management for mobile ad hoc networks , 2005, WiSe '05.

[22]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[23]  Paul Malliavin,et al.  Stochastic Analysis , 1997, Nature.

[24]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[25]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[26]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[27]  Jehoshua Bruck,et al.  Continuum Percolation with Unreliable and Spread-Out Connections , 2005 .

[28]  M. Penrose On a continuum percolation model , 1991, Advances in Applied Probability.

[29]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..