A certificate revocation scheme for wireless ad hoc networks

The increasing prominence of wireless ad hoc networks is stimulating greater interest in developing adequate security mechanisms for securing applications involving these innovative networks paradigms. To-date, the proposed security schemes either provide inadequate security or they are too costly computationally, and therefore impractical for most ad hoc network applications.Adapting wired network security schemes---particularly those involved digital certificates---to wireless ad hoc networks environments, poses many difficulties, primarily for two reasons: the limitation of computational resources, and the absence of centralized entities for performing critical key management tasks such as certificate revocation.In this paper, we propose a certificate revocation scheme for wireless ad hoc networks. Our revocation scheme not only provides a measure of protection against malicious accusation attacks, but it also effectively eliminates the window of opportunity whereby revoked certificates can be used to access network services.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  J. Jubin,et al.  The DARPA packet radio network protocols , 1987, Proceedings of the IEEE.

[3]  Stefaan Seys Security Architecture for Wireless Ad hoc Networks , 2004 .

[4]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[5]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[6]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[7]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[8]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[9]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[10]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[11]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[12]  N. Shacham,et al.  Future directions in packet radio architectures and protocols , 1987, Proceedings of the IEEE.

[13]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[14]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[15]  F.A. Tobagi,et al.  Modeling and performance analysis of multihop packet radio networks , 1987, Proceedings of the IEEE.

[16]  F.A. Tobagi,et al.  Issues in packet radio network design , 1987, Proceedings of the IEEE.

[17]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[18]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[19]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[20]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[21]  W.C. Fifer,et al.  The low-cost packet radio , 1987, Proceedings of the IEEE.

[22]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[23]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[24]  Silvio Micali,et al.  An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..

[25]  Silvio Micali,et al.  An Optimal Algorithm for Synchronous Byzantine Agreement , 1997 .

[26]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[27]  B.H. Davies,et al.  The application of packet switching techniques to combat net radio , 1987, Proceedings of the IEEE.

[28]  J.H. Fischer,et al.  Wide-band packet radio technology , 1987, Proceedings of the IEEE.

[29]  Carlton R. Davis Ipsec: Securing Vpns , 2001 .

[30]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[31]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .