Sybil Safe Virtualization - based Public Key Management Scheme for Mobile Ad Hoc Networks
نویسندگان
چکیده
Abstract— A Sybil attacker is a malicious node which creates several false identities to itself. This attack is extremely harmfull to any voting or cooperation-based system, like a MANET. MANETs (Mobile Ad hoc Networks) are dynamically establiched, cooperation-based wireless networks, deployed without any infrastructure or centralized administration. Due to their dynamic environment, MANETs are highly vulnerable to several malicious attacks, as the Sybil attack. Cryptography is the main technique to assure secure data transferring in these networks, making the key management an important issue. This work presents a new Key Management scheme based on virtualization, the Virtual Key Management (VKM). VKM uses a virtual structure to establish the key management operations between the nodes of the network. Therefore, nodes follow the rules established by this virtual structure to perform the issue, storage, distribution, authentication, protection and revocation of the public and certificates on network. VKM is evaluated under two different types of attacks, the personification and the Sybil, and it is also compared with two well-known key management schemes for MANETs, the PGP-Like and the GKM. VKM is the first key management for MANETs which is completely secure against the Sybil attack independently of the number of attackers and the network configuration. On the other hand, PGP-Like is completely vulnerable to a Sybil attack, and GKM becomes vulnerable with more than 40% of attackers in the network. Moreover, comparing the communication and memory overhead of these key management schemes, VKM has the smallest values independently of network configuration.
منابع مشابه
A Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks
Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...
متن کاملDesign a secure composite key-management scheme in Ad-Hoc Networks using Localization
A mobile Ad-Hoc network is a collection of wireless mobile nodes, dynamically forming a temporary network without the use of any existing network infrastructure or centralized Administration. Providing security support for mobile Ad-Hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and also this fact that wireless networks are s...
متن کاملResilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks
Unlike traditional networks, the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line mean that mobile ad hoc networks frequently display partition owing to node mobility or link failures. Consequently, an ad hoc network is difficult to provide on-line access to trusted authorities or centralized servers. Despite the existence ...
متن کاملFully Distributed Authority-Based Key Management for Mobile Ad Hoc Networks
Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. Key management forms the basis for achieving many security objectives such as protecting routing protocols and private communications. We propose a novel key management scheme for MANETs that exploits mobility and the routing infrastructure to effectively manage secur...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کامل