Abstract
This paper includes a new proposal for the generation of certificates repositories in MANETs. The described process is based on the combination of the self-organized key management model together with the MultiPoint Relay (MPR) technique, generally used in the Optimized Link State Routing protocol. The main objective is to reduce the cost of generating and updating local certificate repositories by selecting those certificates that allow to reach the maximum number of nodes. This goal is just achieved by applying low-cost operations carried out locally by the nodes themselves.
Chapter PDF
Similar content being viewed by others
Keywords
References
Royer, E., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine 6(2), 46–55 (1999)
Vilela, J.P., Barros, J.: A feedback reputation mechanism to secure the optimized link state routing protocol. In: IEEE Communications Society/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm 2007). IEEE Computer Society, Los Alamitos (2007)
Ni, S.Y., Tseng, Y.C., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad hoc network. In: MobiCom 1999: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 151–162. ACM, New York (1999)
Laouti, A., Mhlethaler, P., Najid, A., Plakoo, E.: Simulation results of the OLSR routing protocol for wireless network. In: 1st Mediterranean Ad-Hoc Networks workshop (Med-Hoc-Net), Sardegna, Italy (2002)
Clausen, T., Jacquet, P.: RFC 3626: Optimized Link State Routing Protocol (OLSR) (2003)
Mans, B., Shrestha, N.: Performance evaluation of approximation algorithms for multipoint relay selection. In: The Third Annual Mediterranean Ad Hoc Networking Workshop (2004)
Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl. 30(3), 937–954 (2007)
Saxena, N., Tsudik, G., Yi, J.H.: Threshold cryptography in P2P and MANETs: The case of access control. Comput. Networks 51(12), 3632–3649 (2007)
Narasimha, M., Tsudik, G., Yi, J.: On the utility of distributed cryptography in P2P and MANETs: The case of membership control. In: Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 336–345. IEEE, Los Alamitos (2003)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public key management for mobile ad hoc networks. Mobile Computting and Communication Review 6(4) (2002)
Arboit, G., Crepeau, C., Davis, C.R., Maheswaran, M.: A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks (2006), doi:10.1016/j.adhoc.2006.07.003
Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 232–246. Springer, Heidelberg (2007)
Jung, E., Elmallah, E.S., Gouda, M.G.: Optimal dispersal of certificate chains. IEEE Transactions on Parallel and Distributed Systems 18(4), 474–484 (2007)
JUNG 2.0 (Java Universal Network/Graph framework)
Capkun, S., Buttyan, L., Hubaux, J.P.: Small worlds in security systems: an analysis of the PGP certificate graph. In: Proceedings of The ACM New Security Paradigms Workshop 2002, Norfolk, Virginia Beach, USA, September 2002, p. 8 (2002)
Kleinberg, J.: The small-world phenomenon: An algorithmic perspective. In: Proceedings of the 32nd ACM Symposium on Theory of Computing (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hernández-Goya, C., Caballero-Gil, P., Delgado-Mohatar, O., Molina-Gil, J., Caballero-Gil, C. (2008). Using New Tools for Certificate Repositories Generation in MANETs. In: Atluri, V. (eds) Data and Applications Security XXII. DBSec 2008. Lecture Notes in Computer Science, vol 5094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70567-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-70567-3_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70566-6
Online ISBN: 978-3-540-70567-3
eBook Packages: Computer ScienceComputer Science (R0)