RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management

Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini

2009

Abstract

Chaining-based key management schemes seem to be the ones that best fitMANETs. The main chaining-based scheme is the Self-Organized Public Key Management System (PGP-Like). However, it is fully vulnerable to impersonation attacks. In order to reduce such vulnerability, this article introduces a new public-key management system for MANETs, the Virtual Key Management System (VKM). VKM uses a virtual structure to indicate the trust between nodes and the certificate chains formation. VKM can behave in a restrict way, being able to tolerate impersonation attacks to a certain level, or it can behave similarly to the PGP-Like, just by changing a simple parameter. Thus, VKM can suit any user needs switching between these two models dynamically, without any network reinitialization or reconfiguration.

References

  1. Albini, L., Caruso, A., Chessa, S., and Maestrini, P. (2006). Reliable routing in wireless ad hoc networks: The virtual routing protocol. Journal of Network and Systems Management, 14(3):335- 358.
  2. C? apkun, S., Buttyán, L., and Hubaux, J.-P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1):52-64.
  3. Djenouri, D., Khelladi, L., and Badache, N. (2005). A survey of security issues in mobile ad hoc and sensor networks. IEEE Surveys and Tutorials, 7(4):2-28.
  4. Hubaux, J.-P., Buttyán, L., and C? apkun, S. (2001). The quest for security in mobile ad hoc networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & computing (MobiHoc 2001), pages 146-155.
  5. NS-2 (2007). The network simulator - ns-2.
  6. Robba, A. and Maestrini, P. (2007). Routing in mobile ad-hoc networks: The virtual distance vector protocol. In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2007), pages 1-9.
  7. Silva, E., dos Santos, A. L., Albini, L. C. P., and Lima, M. N. (2008). Quantify misbehavior attacks against the self-organized public key management on manets. In Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), pages 128-135.
  8. Zimmermann, P. R. (1995). The official PGP user's guide. MIT Press, Cambridge, MA, USA.
Download


Paper Citation


in Harvard Style

Fischer e Silva R., da Silva E. and Carlos Pessoa Albini L. (2009). RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 155-158. DOI: 10.5220/0002236501550158


in Bibtex Style

@conference{secrypt09,
author={Renan Fischer e Silva and Eduardo da Silva and Luiz Carlos Pessoa Albini},
title={RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={155-158},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002236501550158},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management
SN - 978-989-674-005-4
AU - Fischer e Silva R.
AU - da Silva E.
AU - Carlos Pessoa Albini L.
PY - 2009
SP - 155
EP - 158
DO - 10.5220/0002236501550158