Skip to main content

Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4325))

Included in the following conference series:

  • 1042 Accesses

Abstract

Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is temporarily unreachable because there can be multiple paths between two entities but certification path discovery is difficult since all the options do not lead to the target entity. On the contrary, in hierarchical PKIs, there is only one path between two entities and certification paths are easy to find. For that reason, we propose a protocol that establishes a virtual hierarchy in a peer-to-peer PKI. The results show that this protocol can be executed in a short time. In addition, our protocol does not require to issue new certificates among PKI entities, facilitates the certification path discovery process and the maximum path length can be adapted to the characteristics of users with limited processing and storage capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ITU-T, Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory: Authentication Framework (Technical Corrigendum), International Telecommunication Union (2000)

    Google Scholar 

  2. Housley, R., Polk, W., Ford, W., Solo, D.: RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2002)

    Google Scholar 

  3. Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: Network and Distributed System Security Symposium (NDSS 2001) (2001)

    Google Scholar 

  4. Adams, C., Lloyd, S.: Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley, Reading (2003)

    Google Scholar 

  5. Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: RFC2560 - X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (1999)

    Google Scholar 

  6. Polk, W.T., Hastings, N.E.: Bridge Certification Authorities: Connecting B2B Public Key Infrastructures. NIST (2000)

    Google Scholar 

  7. Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38–43 (1999)

    Article  Google Scholar 

  8. Hernandez-Serrano, J., Pegueroles, J., Soriano, M.: GKM over large MANET. In: IEEE International Workshop on Self Assembling Wireless Networks (SAWN 2005), pp. 484–490 (2005)

    Google Scholar 

  9. Chatzimisios, P., Boucouvalas, A.C., Vitsas, V.: Optimisation of RTS/CTS Handshake. In: IEEE 802.11Wireless LANs for Maximum Performance, IEEE Global Telecommunications Conference Workshops (GlobeCom Workshops 2004), pp. 270–275 (2004)

    Google Scholar 

  10. Anastasi, G., Conti, M., Gregori, E.: Chapter 3: IEEE 802.11 AD HOC Networks: Protocols, Performance, and Open Issues. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking, Wiley-Interscience, p. 94. Wiley-Interscience, Chichester (2004)

    Google Scholar 

  11. Dai, W.: Crypto ++ 5.2.1 Benchmarks (Accessed at: 4/10/2004), http://www.eskimo.com/~weidai/benchmarks

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Satizábal, C., Forné, J., Hernández-Serrano, J., Pegueroles, J. (2006). Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_41

Download citation

  • DOI: https://doi.org/10.1007/11943952_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49932-9

  • Online ISBN: 978-3-540-49933-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics