Mobile Networks and Management. Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers

Research Article

Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks

Download
522 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-30422-4_25,
        author={Eduardo Silva and Renan Silva and Luiz Albini},
        title={Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks},
        proceedings={Mobile Networks and Management. Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers},
        proceedings_a={MONAMI},
        year={2012},
        month={9},
        keywords={Wireless Ad Hoc Networks Key Management Security Virtualization},
        doi={10.1007/978-3-642-30422-4_25}
    }
    
  • Eduardo Silva
    Renan Silva
    Luiz Albini
    Year: 2012
    Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks
    MONAMI
    Springer
    DOI: 10.1007/978-3-642-30422-4_25
Eduardo Silva1,*, Renan Silva1,*, Luiz Albini1,*
  • 1: Federal University of Paraná
*Contact email: eduardos@inf.ufpr.br, renan@inf.ufpr.br, albini@inf.ufpr.br

Abstract

Cryptography is widely known as the best technique to provide security on data communications in all kinds of networks. Cryptographic methods rely on keys to perform their operations, such as encryption, decryption, and signature. In Wireless Ad Hoc Networks (WANETs), key management is a critical service as it must handle all security threats in a self-organized and decentralized way. Several kinds of attacks can compromise the key management on WANETs, such as Sybil and bad mouthing. This article presents the enhanced VKM, called -VKM, a virtualization-based key management system resistant to Sybil and bad mouthing attacks. -VKM is proposed to work on scenarios in which nodes can be preloaded with secure information before joining the system. Examples of these scenarios include but are not limited to sensor networks, meeting conferences, battlefield operations or health care solutions. Results show that -VKM is highly resistant to Sybil attacks and bad mouthing, presenting 100% of resistance even under 20% of attackers.