Delegation of Signalling Rights

Consider a network of interconnected nodes where each node is identified with a public key. Each node uses the corresponding private key to sign signalling messages. This allows those nodes that know a given node (by its public key) to verify the authenticity of the signalling messages. Under these circumstances, a node may delegate the right to send signalling messages to another node. The delegation may be expressed, for example, in the form of authorization certificates. In this paper we describe how such delegation could be used to optimise signalling paths in mobile and ad hoc network settings. Additionally, we consider the constraints and limitations of the proposed approach.

[1]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[2]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[3]  Jon Howell,et al.  A Formal Semantics for SPKI , 2000, ESORICS.

[4]  Frédéric Cuppens,et al.  Computer Security - ESORICS 2000 , 2000, Lecture Notes in Computer Science.

[5]  Martín Abadi,et al.  On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.

[6]  Pekka Nikander,et al.  Stateless connections , 1997, ICICS.

[7]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[8]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[9]  Tero Hasu,et al.  A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems , 2000, NDSS.

[10]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[11]  Jari Arkko,et al.  MIPv6 BU Attacks and Defenses , 2002 .

[12]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[13]  Pekka Nikander,et al.  Certifying Trust , 1998, Public Key Cryptography.