Abstract
Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is temporarily unreachable because there can be multiple paths between two entities but certification path discovery is difficult since all the options do not lead to the target entity. On the contrary, in hierarchical PKIs, there is only one path between two entities and certification paths are easy to find. For that reason, we propose a protocol that establishes a virtual hierarchy in a peer-to-peer PKI. The results show that this protocol can be executed in a short time. In addition, our protocol does not require to issue new certificates among PKI entities, facilitates the certification path discovery process and the maximum path length can be adapted to the characteristics of users with limited processing and storage capacity.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ITU-T, Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory: Authentication Framework (Technical Corrigendum), International Telecommunication Union (2000)
Housley, R., Polk, W., Ford, W., Solo, D.: RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2002)
Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: Network and Distributed System Security Symposium (NDSS 2001) (2001)
Adams, C., Lloyd, S.: Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley, Reading (2003)
Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: RFC2560 - X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (1999)
Polk, W.T., Hastings, N.E.: Bridge Certification Authorities: Connecting B2B Public Key Infrastructures. NIST (2000)
Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38–43 (1999)
Hernandez-Serrano, J., Pegueroles, J., Soriano, M.: GKM over large MANET. In: IEEE International Workshop on Self Assembling Wireless Networks (SAWN 2005), pp. 484–490 (2005)
Chatzimisios, P., Boucouvalas, A.C., Vitsas, V.: Optimisation of RTS/CTS Handshake. In: IEEE 802.11Wireless LANs for Maximum Performance, IEEE Global Telecommunications Conference Workshops (GlobeCom Workshops 2004), pp. 270–275 (2004)
Anastasi, G., Conti, M., Gregori, E.: Chapter 3: IEEE 802.11 AD HOC Networks: Protocols, Performance, and Open Issues. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking, Wiley-Interscience, p. 94. Wiley-Interscience, Chichester (2004)
Dai, W.: Crypto ++ 5.2.1 Benchmarks (Accessed at: 4/10/2004), http://www.eskimo.com/~weidai/benchmarks
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Satizábal, C., Forné, J., Hernández-Serrano, J., Pegueroles, J. (2006). Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_41
Download citation
DOI: https://doi.org/10.1007/11943952_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49932-9
Online ISBN: 978-3-540-49933-6
eBook Packages: Computer ScienceComputer Science (R0)