Resistindo a Ataques de Personificação no Gerenciamento de Chaves Públicas em Redes Ad Hoc Móveis: Virtual Public-Key Management System
Abstract
Chainning-based key management schemes seams to be the ones that best fit the MANET paradigms. The main chaining-based scheme is the Self-Organized Public Key Management System (PGP-Like). However, it is fully vulnerable to impersonation attacks. In order to reduce such vulnerability, this article introduces a new public-key management system for MANETs, the Virtual Key Management System (VKM). VKM uses a virtual structure to indicate the trust between nodes and the certificate chains formation. VKM is a flexible key management scheme. It can behave in a restrict way, being able to tolerate impersonation attacks to a certain level, or it can behave similarly to the PGP-Like, just by changing a simple parameter. Thus, VKM can suite any user needs with its ability to switch between the two models dynamically, without any network reinitialization or reconfiguration.
References
Čapkun, S., Buttydn, L., and Hubaux, J.-P. (2003a). Self-organized public-key management for mobile ad hoc networks. JEEE Transactions on Mobile Computing, 2(1):52-64.
Čapkun, S., Hubaux, J.-P., and Buttyán, L. (2003b). Mobility helps security in ad hoc networks. In MobiHoc ’03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pages 46-56, New York, NY, USA.
Čapkun, S., Hubaux, J.-P., and Buttyán, L. (2006). Mobility helps peer-to-peer security. IEEE Transactions on Mobile Computing, 5(1):43-51.
Christianson, B. (1996). Why isn’t trust transitive. In Proceedings of the International Workshop on Security Protocols (WSP 1996).
Douceur, J. R. (2001). The sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 01), pages 25 1-260.
Eschenauer, L. and Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), pages 41-47, New York, NY, USA.
Hegland, A. M., Winjum, E., Mjolsnes, S. F., Rong, C., Kure, O., and Spilling, P. (2006). A survey of key management in ad hoc networks. IEEE Communications Surveys, 08(03):48-66.
Hubaux, J.-P, Buttyán, L., and Čapkun, S. (2001). The quest for security in mobile ad hoc networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & computing (MobiHoc 2001), pages 146-155.
Khalili, A., Katz, J., and Arbaugh, W. A. (2003). Toward secure key distribution in truly ad-hoc networks. In Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), page 342, Washington, DC, USA.
Menezes, A. J., Oorschot, P. C. V., and Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
Michiardi, P. and Molva, R. (2003). Ad hoc networks security. ST Journal of System Research, 4(1).
Ngai, E. C. H. and Lyu, M. R. (2004). Trust- and clustering-based authentication services in mobile ad hoc networks. In Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW 2004), pages 582-587, Washington, DC, USA.
Ngai, E. C. H., Lyu, M. R., and Chin, R. T. (2004). An authentication service against dishonest users in mobile ad hoc networks. In Aerospace Conference 2004, volume 02, pages 1275-1285, Big Sky, MT.
NS-2 (2007). The network simulator - ns-2.
Robba, A. and Maestrini, P. (2007). Routing in mobile ad-hoc networks: The virtual distance vector protocol. In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2007), pages 1-9.
Silva, E., dos Santos, A. L., Albini, L. C. P., and Lima, M. N. (2008). Quantify misbehavior attacks against the self-organized public key management on manets. In Proceedings ofthe International Conference on Security and Cryptography (SECRYPT 2008), pages 128-135.
van der Merwe, J., Dawoud, D., and McDonald, S. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Survey, 39(1):1.
Vinogradov, I. M. (1955). An Introduction to the Theory of Numbers. Pergamon Press, London & New York.
Zimmermann, P. R (1995). The official PGP user's guide. MIT Press, Cambridge, MA, USA.
