Notes - MIECT
Redes E Sistemas Autónomos
Notes - MIECT
Redes E Sistemas Autónomos
  • Redes e Sistemas Autónomos
  • Peer-to-Peer Systems and Networks
    • Content Distribution Networks
    • Peer-to-peer networks
      • Types
    • Structured vs Unstructured
    • Fully Decentralized Information System
    • FastTrack/KaZaA
    • OpenNAP/Napster
    • BitTorrent
  • InterPlanetary File System (IPFS)
    • IPFS
      • Bitswap
    • Connecting an IPFS node to the P2P network
    • Searching in DHTs (Structured)
    • File Search
    • Security
  • Ad-Hoc Networks
    • Mobile Ad-hoc networks
    • Application Scenarios
    • Routing
      • AODV - Ad Hoc On-Demand Distance Vector Routing
      • OLSR - Optimized Link State Routing Protocol
      • LAR – Location Aided Routing
      • Batman
    • IP Address Assignment
  • Self-organized systems: Data, learning and decisions
    • Use Cases and Data
    • Machine Learning
      • Supervised Learning
      • Neural Networks
      • Reinforcement Learning
      • Unsupervised Learning: K-means
    • Learning
  • Vehicular Networks
    • Vehicular Ad Hoc Networks
    • How do they work?
    • SPAT: Signal Phase And Timing
    • MAP: MAP
    • Manoeuvre Coordination Message (MCM)
    • Communication Technologies
  • QoS and Security
    • TCP- and UDP-based applications
      • TCP-Cubic
    • QUIC
    • TCP-Vegas
    • Classification of Transport protocols
    • Exploiting Buffering Capabilities
    • QoS in UDP: trade-offs
    • Transmission Quality (Batman v.3)
    • QoS-OLSR
    • Security
      • Key Management
      • RSA (Rivest-Shamir-Adleman) Key
      • Key Management in ad-hoc networks
      • Self-organized public key management (SOPKM)
      • Self-securing ad-hoc wireless networks (SSAWN)
Powered by GitBook
On this page
  • Shared secrets
  • Basic Operation
  • Shared secrets
  1. QoS and Security
  2. Security

Self-securing ad-hoc wireless networks (SSAWN)

Usually, an entity is trusted only if it is verified by a central authority, which cannot be the case in wireless and ad-hoc networks.

The goal of a self-securing network.

  • Achieve high-security assurance.

  • High success ratio.

  • Efficient communication.

Localized trust model, an entity is trusted if any k trusted entities claim so within a certain time period.

  • k entities typically among the entity’s one-hop neighbors.

    • Cares most about the trustworthiness of its immediate neighbors in practice - a node will communicate with the rest of the world via its one-hop neighbors.

  • Once a node is trusted by its local community, it is globally accepted as a trusted node.

  • Otherwise, a locally distrusted entity is regarded as untrustworthy in the entire network.

Shared secrets

The encryption mechanism uses RSA asymmetric keys.

Global Secret Key (SK) and the corresponding Public Key (PK).

  • SK functionality is 'distributed' among nodes.

  • Any K nodes holding a partial secret form a distributed Certificate Authority (CA).

SK is used to sign certificates for all nodes in the network.

A certificate signed by SK can be verified by the well-known public key P K.

Threshold secret sharing.

  • Each node has a part of the secret.

    • Unique ID, derived from the node's address.

    • The mechanism for local detection of misbehaving nodes.

    • At least K one-hop neighboring nodes.

    • Key pair for each node (public and secret keys).

Basic Operation

Basic operation.

  • Distributed PKI.

    • The system's private key is split into server nodes.

    • The quorum of k servers produces certificate updating.

    • Structure of certificate.

  • Operates in phases.

    • Server group formation/maintenance.

    • Certificate updating/revocation.

    • Shared key updating/renewing.

SK is not visible, known, or recoverable by any network node.

Each node carries a certificate signed with SK.

PK is assumed to be well-known for certificate verification.

Nodes without valid certificates are denied access to any network resources such as routing and packet forwarding.

Shared secrets

The partial secret key is a function of node IDs.

  • Generation of a polynomial of order K-1, known only in the initial setup.

  • K nodes holding a partial secret share recover SK using Lagrange interpolation.

  • A coalition of K-1 nodes holding a partial secret share does not have any information about SK.

Node wants to use the distributed CA.

  • Contact K nodes that have a partial secret share.

  • K one-hop neighboring nodes.

    • It is easier to collect reliable information about the misbehavior of closer nodes.

  • PK is known by all nodes

Upon the receipt of vi’s certification request, a node checks its records.

  • If its record shows vi as a well-behaving legitimate node, it returns a “partial” certificate by applying its share of SK.

  • Otherwise, the request is dropped.

By collecting k partial certificates, vi combines them together to generate the full new certificate as if it were from a CA server.

  • Upon receiving k partial certificates from the coalition, node vi multiplies them together to recover its full certificate (Lagrange interpolation – polynomial that passes through several points.

A misbehaving or broken node will be unable to renew its certificate.

A valid certificate represents the trust from a coalition of k nodes.

  • Nodes with valid certificates are globally trusted.

  • Each node contributes to the overall trust management and maintenance by monitoring and certifying its neighboring nodes.

PreviousSelf-organized public key management (SOPKM)

Last updated 1 year ago