Trust threshold based public key management in mobile ad hoc networks
نویسندگان
چکیده
Public key management in mobile ad hoc networks (MANETs) has been studied for several decades. However, the unique characteristics of MANETs have imposed great challenges in designing a fully distributed public key management protocol under resource-constrained MANET environments. These challenges include no centralized trusted entities, resource constraints, and high security vulnerabilities. This work proposes a fully distributed trust-based public key management approach for MANETs using a soft security mechanism based on the concept of trust. Instead of using hard security approaches, as in traditional security techniques, to eliminate security vulnerabilities, our work aims to maximize performance by relaxing security requirements based on the perceived trust. We propose a composite trust-based public key management (CTPKM) with the goal of maximizing performance while mitigating security vulnerability. Each node employs a trust threshold to determine whether or not to trust another node. Our simulation results show that an optimal trust threshold exists to best balance and meet the conflicting goals between performance and security, by exploiting the inherent tradeoff between trust and risk. The results also show that CTPKM minimizes risk (i.e., information leakout) using an optimal trust threshold while maximizing service availability with acceptable communication overhead incurred by trust and key management operations. We demonstrate that CTPKM outperforms both existing non-trust-based and trust-based counterparts.
منابع مشابه
Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks
Amobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our w...
متن کاملReliable and fully distributed trust model for mobile ad hoc networks
Amobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our w...
متن کاملResilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks
Unlike traditional networks, the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line mean that mobile ad hoc networks frequently display partition owing to node mobility or link failures. Consequently, an ad hoc network is difficult to provide on-line access to trusted authorities or centralized servers. Despite the existence ...
متن کاملEffective Trust Model for Public Key Management in Mobile Networks
Today mobile, wireless and non-static networks are getting more and more important as these are triggering the development of next generation networks to support mobile devices are bridging the border to traditional, static networks such as the internet. In public key storage management problem have arisen, because the key computation is still having high overhead and the potential threats of t...
متن کاملA Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Ad Hoc Networks
دوره 44 شماره
صفحات -
تاریخ انتشار 2016