Ecole d'ingénieur et centre de recherche en Sciences du numérique

Bootstrapping security associations in opportunistic networks

Shikfa, Abdullatif; Önen, Melek; Molva, Refik

MP2P 2010, 6th International Workshop on Mobile Peer-to-Peer Computing, March 29-April 2, 2010, Mannheim, Germany / Also published in PerCOM 2010, 8th Annual IEEE International Conference on Pervasive Computing and Communications

    Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, we analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. We then present a specific key management scheme that enables the bootstrapping of local, topology-dependent security associations between a node and its neighbors along with the discovery of the neighborhood topology, thanks to the use of pseudonym certificates and encapsulated signatures. This key management solution relies on two phases: a first phase where nodes are connected to an Identity Manager that provides them with unique pseudonyms to prevent Sybil attacks, and a second phase where the opportunistic communication and the security associations bootstrapping take place without the need for the Identity Manager. This solution with an offline Identity Manager is well-suited to opportunistic networks and can be used as an anchor to provide end-to-end confidentiality based on local and self-organized key management.

Document Doi Bibtex

Titre:Bootstrapping security associations in opportunistic networks
Mots Clés:opportunistic networks; pairwise key management; peer-to-peer key management; security associations.
Département:Sécurité numérique
Eurecom ref:3009
Copyright: © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Bibtex: @inproceedings{EURECOM+3009, doi = { }, year = {2010}, title = {{B}ootstrapping security associations in opportunistic networks}, author = {{S}hikfa, {A}bdullatif and {\"{O}}nen, {M}elek and {M}olva, {R}efik}, booktitle = {{MP}2{P} 2010, 6th {I}nternational {W}orkshop on {M}obile {P}eer-to-{P}eer {C}omputing, {M}arch 29-{A}pril 2, 2010, {M}annheim, {G}ermany / {A}lso published in {P}er{COM} 2010, 8th {A}nnual {IEEE} {I}nternational {C}onference on {P}ervasive {C}omputing and {C}ommunications}, address = {{M}annheim, {ALLEMAGNE}}, month = {03}, url = {} }
Voir aussi: