Sybil Safe Virtualization - based Public Key Management Scheme for Mobile Ad Hoc Networks

نویسندگان

  • Renan Fischer
  • Luiz Carlos Pessoa Albini
چکیده

Abstract— A Sybil attacker is a malicious node which creates several false identities to itself. This attack is extremely harmfull to any voting or cooperation-based system, like a MANET. MANETs (Mobile Ad hoc Networks) are dynamically establiched, cooperation-based wireless networks, deployed without any infrastructure or centralized administration. Due to their dynamic environment, MANETs are highly vulnerable to several malicious attacks, as the Sybil attack. Cryptography is the main technique to assure secure data transferring in these networks, making the key management an important issue. This work presents a new Key Management scheme based on virtualization, the Virtual Key Management (VKM). VKM uses a virtual structure to establish the key management operations between the nodes of the network. Therefore, nodes follow the rules established by this virtual structure to perform the issue, storage, distribution, authentication, protection and revocation of the public and certificates on network. VKM is evaluated under two different types of attacks, the personification and the Sybil, and it is also compared with two well-known key management schemes for MANETs, the PGP-Like and the GKM. VKM is the first key management for MANETs which is completely secure against the Sybil attack independently of the number of attackers and the network configuration. On the other hand, PGP-Like is completely vulnerable to a Sybil attack, and GKM becomes vulnerable with more than 40% of attackers in the network. Moreover, comparing the communication and memory overhead of these key management schemes, VKM has the smallest values independently of network configuration.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Public Key Management Scheme and Threshold- Multisignature Scheme for Mobile Ad Hoc Networks

Mobile ad hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Threshold digital signatures are an important cryptographic tool used in most existing key management schemes for mobile ad hoc networks. This paper proposes a thresholdmultisignature scheme designed specifically for mobile ad hoc networks. The signature scheme allows a subset of s...

متن کامل

Design a secure composite key-management scheme in Ad-Hoc Networks using Localization

A mobile Ad-Hoc network is a collection of wireless mobile nodes, dynamically forming a temporary network without the use of any existing network infrastructure or centralized Administration. Providing security support for mobile Ad-Hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and also this fact that wireless networks are s...

متن کامل

Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks

Unlike traditional networks, the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line mean that mobile ad hoc networks frequently display partition owing to node mobility or link failures. Consequently, an ad hoc network is difficult to provide on-line access to trusted authorities or centralized servers. Despite the existence ...

متن کامل

Fully Distributed Authority-Based Key Management for Mobile Ad Hoc Networks

Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. Key management forms the basis for achieving many security objectives such as protecting routing protocols and private communications. We propose a novel key management scheme for MANETs that exploits mobility and the routing infrastructure to effectively manage secur...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014