Opportunistic node authentication in intermittently connected mobile ad hoc networks

Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically employment of mobility nature of nodes and the storage space of all nodes. However, due to intermittent connectivity, security schemes introduced for the conventional mobile ad hoc networks (MANETs) cannot be directly deployed over ICMANs for node authentication. Therefore, this paper adopts the nodes' mobilities to implement the (t, n) threshold secret sharing and identity-based cryptography (IBC) over ICMANs. Such (t, n) based IBC can subsequently be utilized to facilitate node authentication to defend against the malicious attacks in the ICMANs context. In the proposed security scheme, the master private key of IBC is shared by n distributed private key generators (PKGs), while each node needs to employ its mobility nature to contact at least t-out-of-n PKGs to reconstruct its own private key. To overcome the routing-security interdependence cycle, only face-to-face based node authentication is employed. In other words, authentication and key establishment between nodes and distributed PKGs is only allowed whenever they encounter each other directly. Delay performance of such (t, n) based IBC in the ICMANs context is accordingly modeled and evaluated.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  John Burgess,et al.  Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.

[3]  William A. Arbaugh,et al.  Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[4]  Zhensheng Zhang,et al.  Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.

[5]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[6]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[7]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[8]  Ger Koole,et al.  The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[11]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[12]  S. Keshav,et al.  Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[13]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[14]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[15]  Cauligi S. Raghavendra,et al.  Performance analysis of mobility-assisted routing , 2006, MobiHoc '06.

[16]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[18]  Dharma P. Agrawal,et al.  TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.

[19]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[20]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[21]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.