Social networks for certification in Vehicular Disruption Tolerant Networks

Vehicular Disruption Tolerant Networks appear due to the search of information by drivers, which build mobile ad hoc networks that may suffer from long interruptions. This paper proposes a certification mechanism by means of social networks, enabling cars to share keys through direct contacts between two acquaintances that warrant their identity, so they sign a reciprocal certificate. Certificates signed by a third party can be validated if the user's public key is available to the other party. Further, the reputation mechanism can identify certificates of trusted users. The evaluation shows the behavior of a vehicular network that uses certificates in social networks as cryptographic security mechanism to establish a degree of trust between users.

[1]  Daniel F. Macedo,et al.  An adaptive security management model for emergency networks , 2011, 2011 7th Latin American Network Operations and Management Symposium.

[2]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[3]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[4]  Antonio Alfredo Ferreira Loureiro,et al.  How effective is to look at a vehicular network under a social perception? , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[5]  Ralph Gakenheimer,et al.  Urban mobility in the developing world , 1999 .

[6]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[7]  Xiaodong Lin,et al.  Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..

[8]  Jörg Ott,et al.  Working day movement model , 2008, MobilityModels '08.

[9]  J. Ott,et al.  Increasing Reality for DTN Protocol Simulations , 2007 .

[10]  Peter I. Corke,et al.  Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI , 2013, Comput. Secur..

[11]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[12]  Cengis Hasan,et al.  2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) , 2013 .

[13]  Stephen Farrell,et al.  Bundle Security Protocol Specification , 2011, RFC.