Resistindo a Ataques de Personificação no Gerenciamento de Chaves Públicas em Redes Ad Hoc Móveis: Virtual Public-Key Management System
Resumo
Esquemas de gerenciamento de chaves baseados em cadeias de certificados mostram-se como os melhores para MANETs. O principal esquema baseado em cadeias de certificados é o Self-Organized Public Key Management System (PGP-Like). Entretanto, ele é completamente vulnerável a ataques de personificação. De maneira a reduzir tal vulnerabilidade, este artigo introduz um novo esquema de gerenciamento de chaves para MANETs, o Virtual Key Management System (VKM). O VKM faz uso de uma estrutura virtual para indicar a confiança entre os nós e a formação das cadeias de certificados. O VKM é um esquema flexível podendo se comportar de uma maneira restrita, capaz de suportar ataques de personificação até um certo nível, ou pode se comportar de forma similar ao PGP-Like, mudando um simples parâmetro. Portanto, o VKM pode suprir a necessidade de qualquer usuário sendo capaz de alternar o seu comportamento dinamicamente, sem qualquer reinicialização ou reconfiguração.
Referências
Čapkun, S., Buttydn, L., and Hubaux, J.-P. (2003a). Self-organized public-key management for mobile ad hoc networks. JEEE Transactions on Mobile Computing, 2(1):52-64.
Čapkun, S., Hubaux, J.-P., and Buttyán, L. (2003b). Mobility helps security in ad hoc networks. In MobiHoc ’03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pages 46-56, New York, NY, USA.
Čapkun, S., Hubaux, J.-P., and Buttyán, L. (2006). Mobility helps peer-to-peer security. IEEE Transactions on Mobile Computing, 5(1):43-51.
Christianson, B. (1996). Why isn’t trust transitive. In Proceedings of the International Workshop on Security Protocols (WSP 1996).
Douceur, J. R. (2001). The sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 01), pages 25 1-260.
Eschenauer, L. and Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), pages 41-47, New York, NY, USA.
Hegland, A. M., Winjum, E., Mjolsnes, S. F., Rong, C., Kure, O., and Spilling, P. (2006). A survey of key management in ad hoc networks. IEEE Communications Surveys, 08(03):48-66.
Hubaux, J.-P, Buttyán, L., and Čapkun, S. (2001). The quest for security in mobile ad hoc networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & computing (MobiHoc 2001), pages 146-155.
Khalili, A., Katz, J., and Arbaugh, W. A. (2003). Toward secure key distribution in truly ad-hoc networks. In Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), page 342, Washington, DC, USA.
Menezes, A. J., Oorschot, P. C. V., and Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
Michiardi, P. and Molva, R. (2003). Ad hoc networks security. ST Journal of System Research, 4(1).
Ngai, E. C. H. and Lyu, M. R. (2004). Trust- and clustering-based authentication services in mobile ad hoc networks. In Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW 2004), pages 582-587, Washington, DC, USA.
Ngai, E. C. H., Lyu, M. R., and Chin, R. T. (2004). An authentication service against dishonest users in mobile ad hoc networks. In Aerospace Conference 2004, volume 02, pages 1275-1285, Big Sky, MT.
NS-2 (2007). The network simulator - ns-2.
Robba, A. and Maestrini, P. (2007). Routing in mobile ad-hoc networks: The virtual distance vector protocol. In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2007), pages 1-9.
Silva, E., dos Santos, A. L., Albini, L. C. P., and Lima, M. N. (2008). Quantify misbehavior attacks against the self-organized public key management on manets. In Proceedings ofthe International Conference on Security and Cryptography (SECRYPT 2008), pages 128-135.
van der Merwe, J., Dawoud, D., and McDonald, S. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Survey, 39(1):1.
Vinogradov, I. M. (1955). An Introduction to the Theory of Numbers. Pergamon Press, London & New York.
Zimmermann, P. R (1995). The official PGP user's guide. MIT Press, Cambridge, MA, USA.