A group-based key management protocol for mobile ad hoc networks

Qing Chen, Xiaodong Lin, Sherman Shen, Kazuo Hashimoto, Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. The lack of centralized services allows mobile ad hoc networks to be easily and swiftly deployed, but make it difficult to check others' identities on the other hand. Cryptographic tools have been introduced to secure group communications, such as Private and Public Key Infrastructure. The autonomous and distributed nature of mobile ad hoc network demands a decentralized authentication service, where Public Key Infrastructure is considered a better solution. Public Key Infrastructure can ensure both confidentiality and authenticity, but it is impractical to provide an online trusted third party as Certificate Authority (CA) for mobile ad hoc network. In this paper, we proposed a new key management protocol which utilizes certificate graphs and distributed Certificate Authorities. Certificate graph maintained by each user represents the trust among his neighbors, then the maximum clique of certificate graph is selected to be CAs. Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed. The most trustful subset of these good users - the maximum clique - is elected as the governor of this group, which takes the responsibility of certificate authentication.

Original languageEnglish
Title of host publicationGLOBECOM - IEEE Global Telecommunications Conference
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE Global Telecommunications Conference, GLOBECOM 2009 - Honolulu, HI
Duration: 2009 Nov 302009 Dec 4

Other

Other2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
CityHonolulu, HI
Period09/11/3009/12/4

Fingerprint

Mobile ad hoc networks
Authentication
Governors
Topology
Communication

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Chen, Q., Lin, X., Shen, S., Hashimoto, K., & Kato, N. (2009). A group-based key management protocol for mobile ad hoc networks. In GLOBECOM - IEEE Global Telecommunications Conference [5425805] https://doi.org/10.1109/GLOCOM.2009.5425805

A group-based key management protocol for mobile ad hoc networks. / Chen, Qing; Lin, Xiaodong; Shen, Sherman; Hashimoto, Kazuo; Kato, Nei.

GLOBECOM - IEEE Global Telecommunications Conference. 2009. 5425805.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chen, Q, Lin, X, Shen, S, Hashimoto, K & Kato, N 2009, A group-based key management protocol for mobile ad hoc networks. in GLOBECOM - IEEE Global Telecommunications Conference., 5425805, 2009 IEEE Global Telecommunications Conference, GLOBECOM 2009, Honolulu, HI, 09/11/30. https://doi.org/10.1109/GLOCOM.2009.5425805
Chen Q, Lin X, Shen S, Hashimoto K, Kato N. A group-based key management protocol for mobile ad hoc networks. In GLOBECOM - IEEE Global Telecommunications Conference. 2009. 5425805 https://doi.org/10.1109/GLOCOM.2009.5425805
Chen, Qing ; Lin, Xiaodong ; Shen, Sherman ; Hashimoto, Kazuo ; Kato, Nei. / A group-based key management protocol for mobile ad hoc networks. GLOBECOM - IEEE Global Telecommunications Conference. 2009.
@inproceedings{25dee34c92114700bf3297c0a0e14f7b,
title = "A group-based key management protocol for mobile ad hoc networks",
abstract = "Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. The lack of centralized services allows mobile ad hoc networks to be easily and swiftly deployed, but make it difficult to check others' identities on the other hand. Cryptographic tools have been introduced to secure group communications, such as Private and Public Key Infrastructure. The autonomous and distributed nature of mobile ad hoc network demands a decentralized authentication service, where Public Key Infrastructure is considered a better solution. Public Key Infrastructure can ensure both confidentiality and authenticity, but it is impractical to provide an online trusted third party as Certificate Authority (CA) for mobile ad hoc network. In this paper, we proposed a new key management protocol which utilizes certificate graphs and distributed Certificate Authorities. Certificate graph maintained by each user represents the trust among his neighbors, then the maximum clique of certificate graph is selected to be CAs. Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed. The most trustful subset of these good users - the maximum clique - is elected as the governor of this group, which takes the responsibility of certificate authentication.",
author = "Qing Chen and Xiaodong Lin and Sherman Shen and Kazuo Hashimoto and Nei Kato",
year = "2009",
doi = "10.1109/GLOCOM.2009.5425805",
language = "English",
isbn = "9781424441488",
booktitle = "GLOBECOM - IEEE Global Telecommunications Conference",

}

TY - GEN

T1 - A group-based key management protocol for mobile ad hoc networks

AU - Chen, Qing

AU - Lin, Xiaodong

AU - Shen, Sherman

AU - Hashimoto, Kazuo

AU - Kato, Nei

PY - 2009

Y1 - 2009

N2 - Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. The lack of centralized services allows mobile ad hoc networks to be easily and swiftly deployed, but make it difficult to check others' identities on the other hand. Cryptographic tools have been introduced to secure group communications, such as Private and Public Key Infrastructure. The autonomous and distributed nature of mobile ad hoc network demands a decentralized authentication service, where Public Key Infrastructure is considered a better solution. Public Key Infrastructure can ensure both confidentiality and authenticity, but it is impractical to provide an online trusted third party as Certificate Authority (CA) for mobile ad hoc network. In this paper, we proposed a new key management protocol which utilizes certificate graphs and distributed Certificate Authorities. Certificate graph maintained by each user represents the trust among his neighbors, then the maximum clique of certificate graph is selected to be CAs. Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed. The most trustful subset of these good users - the maximum clique - is elected as the governor of this group, which takes the responsibility of certificate authentication.

AB - Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. The lack of centralized services allows mobile ad hoc networks to be easily and swiftly deployed, but make it difficult to check others' identities on the other hand. Cryptographic tools have been introduced to secure group communications, such as Private and Public Key Infrastructure. The autonomous and distributed nature of mobile ad hoc network demands a decentralized authentication service, where Public Key Infrastructure is considered a better solution. Public Key Infrastructure can ensure both confidentiality and authenticity, but it is impractical to provide an online trusted third party as Certificate Authority (CA) for mobile ad hoc network. In this paper, we proposed a new key management protocol which utilizes certificate graphs and distributed Certificate Authorities. Certificate graph maintained by each user represents the trust among his neighbors, then the maximum clique of certificate graph is selected to be CAs. Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed. The most trustful subset of these good users - the maximum clique - is elected as the governor of this group, which takes the responsibility of certificate authentication.

UR - http://www.scopus.com/inward/record.url?scp=77951597865&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77951597865&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2009.5425805

DO - 10.1109/GLOCOM.2009.5425805

M3 - Conference contribution

AN - SCOPUS:77951597865

SN - 9781424441488

BT - GLOBECOM - IEEE Global Telecommunications Conference

ER -