[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Revocation and update of trust in autonomous delay tolerant networks

Published: 01 July 2016 Publication History

Abstract

We model a decentralised security credential revocation and replacement scheme.We utilise leverage of common friends trust concepts for trust transferral on keys.We propose a revocation scheme to provide entity confidence and trust transferral.We compare similar schemes on key and certificate removal and replacement metrics.Proposal distributes credentials 35% faster, slowed spoofed credentials by 50%. A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.

References

[1]
R Akbani, T Korkmaz, GVS Raju, Heap: hop-by-hop efficient authentication protocol for mobile ad-hoc networks, in: Proceedings of the 2007 spring simulation multiconference, vol. 1. SpringSim '07, Society for Computer Simulation International, San Diego, CA, USA, 2007, pp. 157-165.
[2]
G Arboit, C Crpeau, CR Davis, M Maheswaran, A localized certificate revocation scheme for mobile ad hoc networks, Ad Hoc Networks, 6 (2008) 17-31.
[3]
D Boneh, M Franklin, Identity-based encryption from the Weil pairing, in: Advances in cryptology CRYPTO 2001, vol. 2139 of lecture notes in computer science, Springer Berlin Heidelberg, 2001, pp. 213-229.
[4]
J Burgess, GD Bissias, MD Corner, BN Levine, Surviving attacks on disruption-tolerant networks without authentication, in: MobiHoc '07, ACM, New York, NY, USA, 2007, pp. 61-70.
[5]
C Djamaludin, Traffic Djam simulator. https://github.com/djamaludin/traffic-djam-simulator
[6]
C Djamaludin, E Foo, P Corke, Establishing initial trust in autonomous delay tolerant networks without centralised PKI, Comput Secur, 39 (2013) 299-314.
[7]
D Dolev, A Yao, On the security of public key protocols, IEEE T Inform Theory, 29 (1983) 198-208.
[8]
K Fall, A delay-tolerant network architecture for challenged internets, in: SIGCOMM '03, ACM, New York, NY, USA, 2003, pp. 27-34.
[9]
Focardi R, Gorrieri R. Classification of security properties (part i: Information flow). In: Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: tutorial lectures. FOSAD '00. London, UK: Springer-Verlag; 2001. p. 331-96.
[10]
A Galati, Delay tolerant network, LAP Lambert Academic Publishing, Germany, 2010.
[11]
C Gan, J Mata-Daz, J Muoz, O Esparza, J Alins, A model for revocation forecasting in public-key infrastructures, Knowl Inf Syst (2014) 1-21.
[12]
H Guo, J Li, Y Qian, HoP-DTN: modeling and evaluation of homing-pigeon-based delay-tolerant networks, IEEE T Veh Technol, 59 (2010) 857-868.
[13]
K Hoeper, G Gong, Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation. Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada, Tech Rep CACR, 4 (2006) 2006.
[14]
K Hoeper, G Gong, Monitoring-based key revocation schemes for mobile ad hoc networks: design and security analysis, 2009.
[15]
W Hu, P Corke, W Shih, L Overs, Secfleck: a public key technology platform for wireless sensor networks, in: Wireless sensor networks, vol. 5432. of Lecture Notes in Computer Science, Heidelberg, Springer Berlin, 2009, pp. 296-311.
[16]
IEEE, IEEE standard for information technology - telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 2012.
[17]
Z Jia, X Lin, S-H Tan, L Li, Y Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography, J Netw Comput Appl, 35 (2012) 905-913.
[18]
DB Johnson, DA Maltz, Dynamic source routing in ad hoc wireless networks, Forbes, 353 (1996) 153181.
[19]
N Koblitz, Elliptic curve cryptosystems, Math Comput, 48 (1987) 203-209.
[20]
Kong J., Zerfos P., Luo H., Lu S., Zhang L. Providing robust and ubiquitous security support for mobile ad hoc networks. In: 2012 20th IEEE international conference on network protocols (ICNP). IEEE Computer Society; 2001. p. 251-60.
[21]
N Kumar, R Iqbal, S Misra, JJ Rodrigues, An intelligent approach for building a secure decentralized public key infrastructure in {VANET}, J Comput Syst Sci (2014).
[22]
L Lamport, R Shostak, M Pease, The Byzantine Generals Problem, ACM Trans Program Lang Syst, 4 (1982) 382-401.
[23]
X Lin, R Lu, C Zhang, H Zhu, P-H Ho, X Shen, Security in vehicular ad hoc networks, IEEE Commun Mag, 46 (2008) 88-95.
[24]
Lu Y., Li X., Yu Y.-T., Gerla M. Information-centric delay-tolerant mobile ad-hoc networks. In: 2014 IEEE conference on Computer communications workshops (INFOCOM WKSHPS). 2014. p. 428-33.
[25]
H Luo, J Kong, P Zerfos, S Lu, L Zhang, URSA: ubiquitous and robust access control for mobile ad hoc networks, IEEE/ACM Trans Netw, 12 (2004) 1049-1063.
[26]
J Luo, J-P Hubaux, P Eugster, Dictate: distributed certification authority with probabilistic freshness for ad hoc networks, IEEE T Depend Secure, 2 (2005) 311-323.
[27]
Mall D., Konate K., Pathan A.-S. Secret: a secure and efficient certificate revocation scheme for mobile ad hoc networks. In: 2014 international symposium on Biometrics and security technologies (ISBAST). 2014. p. 137-43.
[28]
GF Marias, K Papapanagiotou, P Georgiadis, ADOPT. A distributed OCSP for trust establishment in MANETs, 2005.
[29]
V Miller, Use of elliptic curves in cryptography, in: Advances in cryptology CRYPTO 85 proceedings, vol. 218 of lecture notes in computer science, Springer Berlin Heidelberg, 1986, pp. 417-426.
[30]
S Misra, S Goswami, C Taneja, A Mukherjee, Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks, Int J Commun Syst (2014).
[31]
T Moore, J Clulow, S Nagaraja, R Anderson, New strategies for revocation in ad-hoc networks, in: Security and privacy in ad-hoc and sensor networks, vol. 4572 of lecture notes in computerscience, Springer Berlin Heidelberg, 2007, pp. 232-246.
[32]
M Omar, Y Challal, A Bouabdallah, Reliable and fully distributed trust model for mobile ad hoc networks, Comput Secur, 28 (2009) 199-214.
[33]
B Parno, A Perrig, V Gligor, Distributed detection of node replication attacks in sensor networks, 2005.
[34]
Pathan A., Lee H.-W., Hong C.S. Security in wireless sensor networks: issues and challenges. In: Advanced communication technology, 2006, vol. 2. ICACT 2006. The 8th international conference. 2006. p. 6-1048.
[35]
Patwardhan A., Joshi A., Finin T., Yesha Y. A data intensive reputation management scheme for vehicular ad hoc networks. In: Mobile and ubiquitous systems: networking services. 2006 third annual international conference on. 2006. p. 1-8.
[36]
M Raya, D Jungels, P Papadimitratos, I Aad, J-P Hubaux, Certificate revocation in vehicular networks, 2006.
[37]
M Raya, P Papadimitratos, I Aad, D Jungels, J-P Hubaux, Eviction of misbehaving and faulty nodes in vehicular networks, IEEE J Sel Areas Comm, 25 (2007) 1557-1568.
[38]
Raya M., Papadimitratos P., Gligor V., Hubaux J.-P. On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM 2008. The 27th conference on computer communications. IEEE. 2008.
[39]
A Shamir, How to share a secret, Commun ACM, 22 (1979) 612-613.
[40]
D Solo, R Housley, W Ford, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, 2002.
[41]
Ubuntu, GPGMigration. https://wiki.ubuntu.com/SecurityTeam/GPGMigration
[42]
Zhang J. A survey on trust management for VANETs. In: Advanced information networking and applications (AINA). 2011 IEEE international conference on. 2011. p. 105-12.
[43]
PR Zimmermann, The official PGP user's guide, MIT Press, Cambridge, MA, USA, 1995.

Cited By

View all
  • (2024)Orbital trust and privacyProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699241(6093-6111)Online publication date: 14-Aug-2024
  • (2019)Retrospective on "a delay-tolerant network architecture for challenged internets"ACM SIGCOMM Computer Communication Review10.1145/3371934.337195849:5(75-76)Online publication date: 8-Nov-2019
  1. Revocation and update of trust in autonomous delay tolerant networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Computers and Security
      Computers and Security  Volume 60, Issue C
      July 2016
      227 pages

      Publisher

      Elsevier Advanced Technology Publications

      United Kingdom

      Publication History

      Published: 01 July 2016

      Author Tags

      1. Autonomous
      2. Delay tolerant network
      3. Key management
      4. Key revocation
      5. Reputation
      6. Trust

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Orbital trust and privacyProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699241(6093-6111)Online publication date: 14-Aug-2024
      • (2019)Retrospective on "a delay-tolerant network architecture for challenged internets"ACM SIGCOMM Computer Communication Review10.1145/3371934.337195849:5(75-76)Online publication date: 8-Nov-2019

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media