Self-securing ad hoc wireless networks

被引:72
作者
Luo, HY [1 ]
Zerfos, P [1 ]
Kong, HJ [1 ]
Lu, SW [1 ]
Zhang, LX [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
来源
ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS | 2002年
关键词
D O I
10.1109/ISCC.2002.1021731
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive eavesdropping over the wireless channel, denial of service attacks by malicious nodes and attacks from compromised nodes or stolen devices. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well. This work provides scalable, distributed authentication services in ad hoc networks. Our design takes a self-securing approach, in which multiple nodes (say, k) collaboratively provide authentication services for other nodes in the network. We first formalize a localized trust model that lays the foundation for the design. We further propose refined localized certification services based on our previous work, and develop a new scalable share update to resist more powerful adversaries. Finally, we evaluate the solution through simulation and implementation.
引用
收藏
页码:567 / 574
页数:8
相关论文
共 23 条
[1]  
ABDULRAHMAN A, 1997, ACM NEW SEC PAR WORK
[2]  
ABDULRAHMAN A, 1997, EDI FORUM J ELEC APR
[3]  
ARESENAULT A, INTERNET X 509 PUBLI
[4]   Maintaining authenticated communication in the presence of break-ins [J].
Canetti, R ;
Halevi, S ;
Herzberg, A .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :61-105
[5]  
Fox A., 1996, ACM MOBICOM
[6]  
Frankel Y., 1997, FOCS 97
[7]  
FRANKEL Y, 1992, TR 920402 U WISC MIL
[8]  
Frankel Yair, 1997, CRYPTO
[9]  
Gennaro R., 1996, J CRYPTOLOGY
[10]  
GONG L, 1993, IEEE J SELECTED AREA, V11