SOMA-E: Self-organized mesh authentication - Extended

نویسندگان

  • Foivos F. Demertzis
  • Christos Xenakis
چکیده

Community mesh networks have emerged rapidly in every metropolis around the world, however many of the security methods applied are counter-intuitive and usually disrupt the autonomous characteristics of the mesh nodes. In SOMA we present a structured Peer-to-Peer solution providing authentication service based on a scalable, self-organized and fully distributed Web-of-Trust. Our proposal is a hybrid Public Key Infrastructure build on top of Chord, allowing each agent to place its own trust policy while keeping the autonomous characteristics the nodes intact. Our goal is to create a large-scale authentication system for mesh networks without the need of a Trusted Third Party. We leave the decision of whom to trust in each agent independently taking advantage of the overlay to alleviate the shortcomings of traditional Web-of-Trust models. This is achieved by using the overlay as a meta-structure to infer trust relationships providing a policy-based system, which is further enhanced with a Bayesian reputation based model so as to cope with the different challenges posed by the distributed nature of the system. The possible attacks and limitations of our proposal are also investigated and discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SOMA: Self-Organised Mesh Authentication

Community mesh networks have emerged rapidly in every metropolis around the world, however many of the security methods applied are counter-intuitive and usually disrupt the autonomous characteristics of the mesh nodes. In SOMA we present a structured Peerto-Peer solution providing authentication service based on a scalable, self-organized and fully distributed Web-of-Trust. Our proposal is a h...

متن کامل

Reputation Systems for Self-Organized Networks: Lessons Learned

Self-organized networks such as mobile ad-hoc, Internet-based peer-to-peer, wireless mesh and Fourth Generation (4G) Wireless networks depend on cooperation of nodes. Reputation systems help nodes decide with whom to cooperate and which nodes to avoid. They have been studied and applied almost separately in diverse disciplines such as economics, computer science and social science, resulting in...

متن کامل

Secure Cluster based Self Organized Authentication with Key Management Scheme in Vehicular Adhoc Network

Vehicular Ad hoc Networks (VANETs) are the promising approach and also a key component of intelligent transport system. Its main aim is to provide driver convenience and safety. To improve security and balance the message overload the cluster approach and the key distribution technique is used. In this model first the network is analyzed based on its parameters and develop three models based on...

متن کامل

Avoidance of misbehaving nodes in wireless mesh networks

A wireless mesh network is a self organized set of nodes that are connected by wireless links. Communicating parties that are not in wireless range of each other relay packets via intermediate nodes. A common approach to wireless mesh routing is reactive routing, where a fixed path between the communicating endpoints is established on-demand when a new session is initiated. This paper proposes ...

متن کامل

A Bilateral Authentication Protocol Based on Lightweight CA and Proof with BAN Logic for Wireless Mesh Networks

In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Mathematical and Computer Modelling

دوره 57  شماره 

صفحات  -

تاریخ انتشار 2013