Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/986858.986874acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Secure long term communities in ad hoc networks

Published: 31 October 2003 Publication History

Abstract

Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home networks. In such networks, devices are linked by long term relations. To ensure their security, it is necessary to define precisely which devices belong to a given network and are consequently inside the security perimeter. The chosen mechanisms need to be easy to use, because the users of SOHO and home networks are neither willing nor able to configure the security of their network. In this paper, we present a new fully distributed approach for securing long term communities of devices in SOHO and home ad hoc networks that minimizes user intervention.

References

[1]
P. Albers, O. Camp, J.-M. Percher, B. Jouga, L. Mé, and R. Puttini. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), Apr. 2002.]]
[2]
J. Arkko, J. Kempf, B. Sommerfeld, and B. Zill. IETF Draft: SEcure Neighbor Discovery (SEND), 2003.]]
[3]
D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to strangers: Authentication in adhoc wireless networks. In Proceedings of the ISOC Network and Distributed Systems Security Symposium, Feb. 2002.]]
[4]
G. Bell and J. Gemmell. A call for the home media network. Communications of the ACM, 45(7):71--75, 2002.]]
[5]
R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh. Bootstrapping security associations for routing in mobile ad-hoc networks. Technical report, University of Maryland, May 2002.]]
[6]
S. Capkun, J. P. Hubaux, and L. Buttyan. Mobility helps security in ad hoc networks. In Proceedings of the Fourth International Symposium on Mobile Ad Hoc Networking and Computing, 2003.]]
[7]
S. Corson and J. Macker. RFC 2501: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Jan. 1999.]]
[8]
L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. Technical report, University of Maryland, 2002.]]
[9]
L. Feeney, B. Ahlgren, and A. Westerlund. Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine, June 2001.]]
[10]
Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks, 2002.]]
[11]
J. P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, October 2001.]]
[12]
IEEE Standard Department. IEEE 802.11 Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY), 1999.]]
[13]
J. Kohl and C. Neuman. RFC 1510: The Kerberos Network Authentication Service (V5), 1993.]]
[14]
Merriam-Webster. Merriam-webster online dictionnary, www.webster.com.]]
[15]
C. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses. In NDSS'02, Feb. 2002.]]
[16]
G. O'Shea and M. Roe. Child-proof authentication for mipv6 (cam). ACM SIGCOMM Computer Communication Review, 31(2):4--8, 2001.]]
[17]
A. Perrig and D. Song. Hash visualization: a new technique to improve real-world security. In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99), pages 131--138, 1999.]]
[18]
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor networks. In Mobile Computing and Networking, pages 189--199, 2001.]]
[19]
M. K. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 22(1):31--42, Jan. 1996.]]
[20]
S. W. Smith. Humans in the loop: Human-computer interaction and security. IEEE Security & Privacy, June 2003.]]
[21]
F. Stajano. The Resurrecting Duckling -- What Next? Lecture Notes in Computer Science, 2133:204--211, 2001.]]
[22]
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In 7th International Workshop on Security Protocols, pages 172--194, 1999.]]
[23]
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24--30, 1999.]]
[24]
P. Zimmerman. The PGP user's guide.]]

Cited By

View all
  1. Secure long term communities in ad hoc networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
    October 2003
    154 pages
    ISBN:1581137834
    DOI:10.1145/986858
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 October 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc networks security
    2. home network security
    3. secure long term community

    Qualifiers

    • Article

    Conference

    CCS03
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Symbiotic NetworksWireless Personal Communications: An International Journal10.1007/s11277-008-9490-545:4(479-495)Online publication date: 3-Jan-2019
    • (2019)Virtual Private Ad Hoc NetworkingWireless Personal Communications: An International Journal10.1007/s11277-006-9021-138:1(125-141)Online publication date: 3-Jan-2019
    • (2013)Security Management in Heterogeneous Distributed Sensor NetworksIT Policy and Ethics10.4018/978-1-4666-2919-6.ch035(773-793)Online publication date: 2013
    • (2012)Security Management in Heterogeneous Distributed Sensor NetworksUbiquitous Multimedia and Mobile Agents10.4018/978-1-61350-107-8.ch012(274-294)Online publication date: 2012
    • (2010)An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor networkSecurity and Communication Networks10.1002/sec.2774:9(1013-1026)Online publication date: 13-Dec-2010
    • (2009)Trust-Based Countermeasures for Securing OLSR ProtocolProceedings of the 2009 International Conference on Computational Science and Engineering - Volume 0210.1109/CSE.2009.130(745-752)Online publication date: 29-Aug-2009
    • (2009)On the Unobservability of a Trust Relation in Mobile Ad Hoc NetworksProceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks10.1007/978-3-642-03944-7_1(1-11)Online publication date: 30-Aug-2009
    • (2007)Securing Personal Network clusters2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 200710.1109/SECCOM.2007.4550350(320-329)Online publication date: Sep-2007
    • (2007)A Secure Lightweight Approach of Node Membership Verification in Dense HDSNMILCOM 2007 - IEEE Military Communications Conference10.1109/MILCOM.2007.4455133(1-6)Online publication date: Oct-2007
    • (2007)RBAC and XML security in adhoc networks2007 9th International Symposium on Signal Processing and Its Applications10.1109/ISSPA.2007.4555419(1-4)Online publication date: Feb-2007
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media