4 research outputs found

    Identity support in a security and trust service for ad hoc m-commerce trading systems

    Get PDF

    Trust and mobility-based clustering algorithm for secure mobile ad hoc networks

    No full text
    International audienceAn Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through wireless links in the absence of the fixed infrastructure and any centralized control. Theses characteristics make it able to adapt and operate in difficult conditions, but also vulnerable to new security attacks not present in a traditional wired network. In this paper a new approach to secure MANETs has been proposed. Our solution is based on our efficient trust model and distributed algorithm to clustering network in order to distribute role of certification authority (CA) in each cluster. We use fully self-organized security and monitoring process to supervise behaviors of nodes with low trust level. Also, we propose clustering algorithm based on the trust and mobility metric to select CA and to establish public key infrastructure (PKI) in each cluster. Furthermore, we introduce new concept Dynamic Demilitarized Zone (DDMZ) to protect CAs and avoid the single point of failure in each cluster. The DDMZ is formed by set of the dispensable nodes which must be confident and located at one-hop from the CA. Our approach can be easily extended to other hierarchical routing protocols. The simulation results include an evaluation of the stability, availability and security

    A trading model and security regime for mobile e-commerce via ad hoc wireless networking

    Get PDF
    Ad hoc wireless networking offers mobile computer users the prospect of trading with others in their vicinity anywhere anytime. This thesis explores the potential for developing such trading applications. A notable difficulty in designing their security services is being unable to use trusted parties. No one can be guaranteed present in each ad hoc wireless network session. A side benefit is that their costs don't have to be paid for. A reference model is defined for ad hoc m-commerce and a threat model is for- mulated of its security vulnerabilities. They are used to elicit security objectives and requirements for such trading systems. Possible countermeasures to address the threats are critically analysed and used to design security services to mitigate them. They include a self-organised P2P identity support scheme using PGP cer- tificates; a distributed reputation system backed by sanctions; a group membership service based on membership vouchers, quorate decisions by some group members and partial membership lists; and a security warning scheme. Security analysis of the schemes shows that they can mitigate the threats to an adequate degree to meet the trading system's security objectives and requirements if users take due care when trading within it. Formal verification of the system shows that it satisfies certain safety properties
    corecore