A Judgment Mechanism for Key Revocation
نویسندگان
چکیده
Key management is perhaps the most complex and most vulnerable part of any cryptographic implementation. To date key generation and activation have been extensively studied in the context of mobile ad hoc and wireless sensor networks. However, a dearth of research exists in designing techniques for key deactivation (revocation) and even less so for key reactivation. In this paper we study key-revocation schemes that are well-suited for the ad-hoc network environment. Specifically, we present a novel scheme with the following characteristics: • Distributed: Our scheme requires no permanently available central authority. • Active: A sufficient number of selfish honest nodes are incentivised to revoke malicious nodes. • Secure: The scheme is secure against a large number of malicious nodes (30% of the network for an IDS-error rate of 15%). • IDS-error tolerant: Revocation decisions are based on IDS. Our scheme is active for any meaningful IDS (IDS error rate < 0.5) and secure for an IDS error rate of up to 29%. Several schemes in the literature have 2 of the first 3 properties (property number 4 is typically not explored), but this work is the first to possess all four. This makes our revocation scheme well-suited for environments such as ad hoc networks, which are very dynamic, have significant bandwidth-constraints, and where many nodes are vulnerable to compromise.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملWindowed Key Revocation in Public Key Infrastructures
A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Internet is the lack of a mechanism that provides scalable certificate revocation. In this paper, we propose a novel mechanism called Windowed Revocation. In windowed revocation, certificate revocation is announced for short periods in periodic Certificate Revocation Lists (CRLs). Due to the assuran...
متن کاملA Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid
The End Entity Certificates (EECs) revocation mechanism in Grid Security Infrastructure (GSI) adopts Certificate Revocation List (CRL) currently. However, CRL is an inefficient mechanism with drawbacks of “time granularity problem” and unmanageable sizes. This paper presents a new EECs revocation mechanism MEECRM (Mediated RSA-based End Entity Certificates Revocation Mechanism) to eliminate “ke...
متن کاملuKeying: A Key Management Framework for Wireless Sensor Networks Utilizing a Unique Session Key
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. Key management includes two aspects: key distribution and key revocation. The goal of the key distribution is to establish the required keys between sensor nodes which must exchange data. Key revocation is used to remove compromised sensor nodes from the network. Although ...
متن کاملAn efficient scheme for removing compromised sensor nodes from wireless sensor networks
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categori...
متن کامل