Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks

A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc networks. In this paper, we propose a fully distributed public key certificate management system based on trust graphs and threshold cryptography. It permits users to issue public key certificates, and to perform authentication via certificates’ chains without any centralized management or trusted authorities. Moreover, thanks to the use of threshold cryptography; our system resists against false public keys certification. We perform an overall evaluation of our proposed approach through simulations. The results indicate out performance of our approach while providing eective security.

[1]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[2]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[3]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[4]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[5]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[6]  Ivan Stojmenovic,et al.  Handbook of Wireless Networks and Mobile Computing , 2002 .

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  A. Rbnyi ON THE EVOLUTION OF RANDOM GRAPHS , 2001 .

[9]  Yacine Challal,et al.  NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[10]  Siu-Ming Yiu,et al.  Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..

[11]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[12]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[13]  Patrick Th. Eugster,et al.  DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[14]  Taylor Yu The Kerberos Network Authentication Service (Version 5) , 2007 .

[15]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[16]  Mohan S. Kankanhalli,et al.  Efficient and robust key management for large mobile ad hoc networks , 2005, Comput. Networks.

[17]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[18]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[19]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[20]  Alice Bob,et al.  The PGP Trust Model , 2005 .

[21]  Abderrahim Benslimane,et al.  Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[22]  B. Bollobás The evolution of random graphs , 1984 .

[23]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[24]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[25]  Weihong Wang,et al.  Self-managed heterogeneous certification in mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[26]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[27]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[28]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[29]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[30]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[31]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[32]  D. Toshniwal,et al.  Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks , 2006, 2006 International Conference on Hybrid Information Technology.