Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
PGP: Pretty Good Privacy
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Simplified Approach to Threshold and Proactive RSA
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Identification in Ad Hoc Networks
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
Secure cooperative ad hoc applications within UAV fleets
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Hi-index | 0.00 |
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANets), furthermore leads to a situation where it is very difficult to establish secure community-based or even peer to peer communication channels. The basic and major problem that has to be solved is that of identity management: how to identify and authenticate an entity that is a priori unknown and that tries to dynamically join a community in the network? Even if we solve this problem, how to distribute these certified identities over the network? In this paper, we propose to make a clear distinction between two kinds of organization of a MANet. We consider an identity-based approach and a goal-based approach. In the identity-based approach the nodes of the network have to be precisely identified (i.e. with their real-world identity) and a central administration is therefore required. In the goal-based approach, identities are simply used to distinguish between the nodes that collaborate to a certain goal. We claim that when this second approach is considered, it is possible to support a totally distributed identity management system. Our contribution is the design and the implementation of such a system for these goal-based networks. We assume that the users who want to get involved are provided with PDAs supplied with smart cards and more precisely Java Cards, which are the basic secure bricks on which our approach relies. Of course, our approach supports the uniqueness of identities, but it furthermore enforces permanency, i.e. it prevents changing and repudiation of identity. In this paper, we describe the protocol that we have designed to support our solution and its effective implementation.