This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Mobility Helps Peer-to-Peer Security
January 2006 (vol. 5 no. 1)
pp. 43-51
Srdjan Capkun, IEEE Computer Society
Jean-Pierre Hubaux, IEEE Computer Society
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case, the security protocol runs over one-hop radio links. We further show that mobility can be used for the periodic renewal of vital security information (e.g., the distribution of hash chain/Merkle tree roots). In the second scenario, we consider fully self-organized security: Users authenticate each other by visual contact and by the activation of an appropriate secure side channel of their personal device; we show that the process can be fuelled by taking advantage of trusted acquaintances. We then show that the proposed solution is generic: It can be deployed on any mobile network and it can be implemented either with symmetric or with asymmetric cryptography. We provide a performance analysis by studying the behavior of the solution in various scenarios.

[1] N. Asokan and P. Ginzboorg, “Key Agreement in Ad Hoc Networks,” Computer Comm., vol. 23, pp. 1627-1637, 2000.
[2] F. Bai, N. Sadagopan, and A. Helmy, “IMPORTANT: A Framework to Systematically Analyze the Impact of Mobility on Performance of RouTing Protocols for Adhoc NeTworks,” Proc. Conf. Computer Comm. (Infocom), Apr. 2003.
[3] D. Balfanz, D. Smetters, P. Stewart, and H. Wong, “Talking to Strangers: Authentication in Ad Hoc Wireless Networks,” Proc. Network and Distributed Systems Security Symp., 2002.
[4] R.B. Bobba, L. Eschenauer, V.D. Gligor, and W. Arbaugh, “Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks,” Proc. IEEE Global Telecomm. Conf. (Globecom), Dec. 2003.
[5] M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” William Stallings, Practical Cryptography for Data Internetworks, IEEE CS Press, 1996.
[6] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, May 2003.
[7] M. Corner and B. Noble, “Zero-Interaction Authentication,” Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, 2002.
[8] S. Čapkun, L. Buttyán, and J.-P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-Hop Wireless Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), Oct. 2003.
[9] S. Čapkun, L. Buttyán, and J.-P. Hubaux, “Self-Organized Public-Key Management for Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 2, no. 1, Jan.-Mar. 2003.
[10] S. Čapkun and J.-P. Hubaux, “BISS: Building Secure Routing Out of an Incomplete Set of Security Associations,” Proc. ACM Workshop Wireless Security, 2003.
[11] S. Čapkun, J.-P. Hubaux, and L. Buttyán, “Mobility Helps Peer-to-Peer Security,” Technical report, no. IC/2003/81, EPFL-IC-LCA, 2003.
[12] S. Čapkun, J.-P. Hubaux, and L. Buttyán, “Mobility Helps Security in Ad Hoc Networks,” Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, 2003.
[13] J. Douceur, “The Sybil Attack,” Proc. First Int'l Workshop Peer-to-Peer Systems (IPTPS), 2002.
[14] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, “Age Matters: Efficient Route Discovery in Mobile Ad Hoc Networks Using Encounter Ages,” Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, 2003.
[15] L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security, 2002.
[16] M. Grossglauser and D. Tse, “Mobility Increases the Capacity of Ad-Hoc Wireless Networks,” Proc. Conf. Computer Comm. (Infocom), 2001.
[17] M. Grossglauser and M. Vetterli, “Locating Nodes with EASE: Mobility Diffusion of Last Encounters in Ad Hoc Networks,” Proc. Conf. Computer Comm. (Infocom), 2003.
[18] R. Hauser, A. Przygienda, and G. Tsudik, “Reducing the Cost of Security in Link State Routing,” Proc. Network and Distributed Systems Security Symp., Feb. 1997.
[19] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Efficient Security Mechanisms for Routing Protocols,” Proc. Network and Distributed Systems Security Symp., Feb. 2003.
[20] Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications, June 2002.
[21] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Proc. Eighth Ann. Int'l Conf. Mobile Computing and Networking, Sept. 2002.
[22] H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks,” IEEE/ACM Trans. Networking, 2004.
[23] G. Montenegro and C. Castelluccia, “Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses,” Proc. Network and Distributed Systems Security Symp., 2002.
[24] G. O'Shea and M. Roe, “Child-Proof Authentication for MIPv6 (CAM),” ACM Computer Comm. Rev., Apr. 2001.
[25] A. Perrig, R. Canetti, J.D. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol,” RSA CryptoBytes, vol. 5, Summer 2002.
[26] R.C. Merkle, “Protocols for Public Key Cryptosystems,” Proc. IEEE Symp. Security and Privacy, 1980.
[27] J. Yoon, M. Liu, and B. Noble, “Random Waypoint Considered Harmful,” Proc. Conf. Computer Comm. (Infocom), 2003.
[28] Kan Zhang, “Efficient Protocols for Signing Routing Messages,” Proc. Network and Distributed Systems Security Symp., Mar. 1998.
[29] L. Zhou and Z. Haas, “Securing Ad Hoc Networks,” IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.

Index Terms:
Index Terms- Mobile ad hoc networks, network-level security and protection.
Citation:
Srdjan Capkun, Jean-Pierre Hubaux, Levente Butty?, "Mobility Helps Peer-to-Peer Security," IEEE Transactions on Mobile Computing, vol. 5, no. 1, pp. 43-51, Jan. 2006, doi:10.1109/TMC.2006.12
Usage of this product signifies your acceptance of the Terms of Use.