Gerenciamento de chaves públicas sobrevivente baseado em grupos para MANETs
Resumo
Dentre os diversos sistemas de gerenciamento de chaves propostos para as MANETs, o Sistema de Gerenciamento de Chaves Públicas Auto-organizado tem sido o mais indicado, por ser completamente distribuído e auto-organizável. Contudo, ele é totalmente vulnerável a ataques Sybil. Este trabalho apresenta um sistema de gerenciamento de chaves públicas sobrevivente a tais ataques, chamado de SG-PKM. Nesse sistema, os nós formam grupos a partir das suas relações de amizade e emitem certificados entre os membros do grupo. Além disso, os grupos emitem certificados entre si para garantir a autenticidade das suas chaves públicas. Para autenticarem-se, dois nós sem uma relação direta devem formam no mínimo duas cadeias de certificados ligando os grupos a que pertencem. Resultados obtidos via simulações mostram a sobrevivência do sistema diante de ataques Sybil, garantindo mais de 70% de autenticações não comprometidas para grupos com cinco ou seis membros diante de 40% de nós maliciosos.Referências
Bannack, A., da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2008). Segurança em redes ad hoc. In Anais do XXVI Simpósio Brasileiro de Telecomunicações (SBRT ’08), pages 19–20.
Buttyán, L. and Hubaux, J.-P. (2002). Report on a working session on security in wireless ad hoc networks. In Mobile Computing and Communications Review, volume 6.
Čapkun, S., Buttyán, L., and Hubaux, J.-P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1):52–64.
da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2008a). Identity-based key management in mobile ad hoc networks: Techniques and applications. IEEE Wireless Communications Magazine, 15:46–52.
da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2008b). Quantifying misbehaviour attacks against the self-organized public key management on manets. In Proceedings of the International Conference on Security and Cryptography (SECRYPT ’08), pages 128–135.
da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2009). Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks, volume 48 of Springer CCIS, pages 166–179. Springer.
e Silva, R. F., da Silva, E., and Albini, L. C. P. (2009). Resisting impersonation attacks in chaining-based public-key management on manets: the virtual public key management. In Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), pages 155–158.
Latapy, M., Magnien, C., and Vecchio, N. D. (2008). Basic notions for the analysis of large two-mode networks. Social Networks, 30(1):31–48.
Nogueira, M., Pujolle, G., da Silva, E., dos Santos, A., and Albini, L. C. P. (2009). Survivable keying for wireless ad hoc networks. In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM ’09), pages 606–613.
Papadimitratos, P. and Haas, Z. J. (2005). Securing mobile ad hoc networks, chapter 21, pages 457–481. CRC Press - Auerbach Publications, Boca Raton, Florida, USA.
Pedersen, T. P. (1991). A threshold cryptosystem without a trusted party. In Proceedings of Advances in Cryptology (EuroCrypt ’91), volume 547 of LNCS, pages 522–526, London, UK. Springer.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612–613.
van der Merwe, J., Dawoud, D., and McDonald, S. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Survey, 39(1):1.
Wu, B., Chen, J., Wu, J., and Cardei, M. (2006). A survey on attacks and countermeasures in mobile ad hoc networks, chapter 12, pages 103–136. Springer-Verlag, New York, NY, USA.
Zhang, C., Song, Y., and Fang, Y. (2008). Modeling secure connectivity of self-organized wireless ad hoc networks. In Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ’08), pages 251–255.
Buttyán, L. and Hubaux, J.-P. (2002). Report on a working session on security in wireless ad hoc networks. In Mobile Computing and Communications Review, volume 6.
Čapkun, S., Buttyán, L., and Hubaux, J.-P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1):52–64.
da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2008a). Identity-based key management in mobile ad hoc networks: Techniques and applications. IEEE Wireless Communications Magazine, 15:46–52.
da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2008b). Quantifying misbehaviour attacks against the self-organized public key management on manets. In Proceedings of the International Conference on Security and Cryptography (SECRYPT ’08), pages 128–135.
da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2009). Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks, volume 48 of Springer CCIS, pages 166–179. Springer.
e Silva, R. F., da Silva, E., and Albini, L. C. P. (2009). Resisting impersonation attacks in chaining-based public-key management on manets: the virtual public key management. In Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), pages 155–158.
Latapy, M., Magnien, C., and Vecchio, N. D. (2008). Basic notions for the analysis of large two-mode networks. Social Networks, 30(1):31–48.
Nogueira, M., Pujolle, G., da Silva, E., dos Santos, A., and Albini, L. C. P. (2009). Survivable keying for wireless ad hoc networks. In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM ’09), pages 606–613.
Papadimitratos, P. and Haas, Z. J. (2005). Securing mobile ad hoc networks, chapter 21, pages 457–481. CRC Press - Auerbach Publications, Boca Raton, Florida, USA.
Pedersen, T. P. (1991). A threshold cryptosystem without a trusted party. In Proceedings of Advances in Cryptology (EuroCrypt ’91), volume 547 of LNCS, pages 522–526, London, UK. Springer.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612–613.
van der Merwe, J., Dawoud, D., and McDonald, S. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Survey, 39(1):1.
Wu, B., Chen, J., Wu, J., and Cardei, M. (2006). A survey on attacks and countermeasures in mobile ad hoc networks, chapter 12, pages 103–136. Springer-Verlag, New York, NY, USA.
Zhang, C., Song, Y., and Fang, Y. (2008). Modeling secure connectivity of self-organized wireless ad hoc networks. In Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ’08), pages 251–255.
Publicado
20/07/2010
Como Citar
SILVA, Eduardo da; SANTOS, Aldri L. dos; ALBINI, Luiz Carlos P..
Gerenciamento de chaves públicas sobrevivente baseado em grupos para MANETs. In: CONCURSO DE TESES E DISSERTAÇÕES (CTD), 23. , 2010, Belo Horizonte/MG.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2010
.
p. 73-80.
ISSN 2763-8820.