A smart card based distributed identity management infrastructure for mobile ad hoc networks

  • Authors:
  • Eve Atallah;Serge Chaumette

  • Affiliations:
  • LaBRI, Université Bordeaux 1, Talence Cedex, France and XLIM, Université de Limoges, Limoges Cedex, France;LaBRI, Université Bordeaux 1, Talence Cedex, France

  • Venue:
  • WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANets), furthermore leads to a situation where it is very difficult to establish secure community-based or even peer to peer communication channels. The basic and major problem that has to be solved is that of identity management: how to identify and authenticate an entity that is a priori unknown and that tries to dynamically join a community in the network? Even if we solve this problem, how to distribute these certified identities over the network? In this paper, we propose to make a clear distinction between two kinds of organization of a MANet. We consider an identity-based approach and a goal-based approach. In the identity-based approach the nodes of the network have to be precisely identified (i.e. with their real-world identity) and a central administration is therefore required. In the goal-based approach, identities are simply used to distinguish between the nodes that collaborate to a certain goal. We claim that when this second approach is considered, it is possible to support a totally distributed identity management system. Our contribution is the design and the implementation of such a system for these goal-based networks. We assume that the users who want to get involved are provided with PDAs supplied with smart cards and more precisely Java Cards, which are the basic secure bricks on which our approach relies. Of course, our approach supports the uniqueness of identities, but it furthermore enforces permanency, i.e. it prevents changing and repudiation of identity. In this paper, we describe the protocol that we have designed to support our solution and its effective implementation.