Opportunistic networks are a new and specific type of mobile peer-to-peer networks where end-to-end connectivity cannot be assumed. These networks present compelling challenges, especially from a security perspective, as interactive protocols are infeasible in such environments. In this article, we focus on the problem of key management in the framework of content-based forwarding and opportunistic networks. After analysing this issue and identifying specific security threats such as Sybil attacks, we propose a specific key management scheme that enables the bootstrapping of local, topology-dependent security associations between a node and its neighbours along with the discovery of the neighbourhood topology, thanks to the use of pseudonym certificates and encapsulated signatures.
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems, 2012, Volume 9, N°1-2, Special Issue on Recent Advances in P2P Systems, ISSN:1754-3916
Type:
Journal
Date:
2011-12-31
Department:
Sécurité numérique
Eurecom Ref:
3380
Copyright:
© Inderscience. Personal use of this material is permitted. The definitive version of this paper was published in International Journal of Communication Networks and Distributed Systems, 2012, Volume 9, N°1-2, Special Issue on Recent Advances in P2P Systems, ISSN:1754-3916 and is available at : http://dx.doi.org/10.1504/IJCNDS.2012.047898
See also:
PERMALINK : https://www.eurecom.fr/publication/3380