Mobility helps peer-to-peer security

S. Capkun, J. P. Hubaux, L. Buttyán

Research output: Contribution to journalArticle

86 Citations (Scopus)

Abstract

We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case, the security protocol runs over one-hop radio links. We further show that mobility can be used for the periodic renewal of vital security information (e.g., the distribution of hash chain/Merkle tree roots). In the second scenario, we consider fully self-organized security: Users authenticate each other by visual contact and by the activation of an appropriate secure side channel of their personal device; we show that the process can be fuelled by taking advantage of trusted acquaintances. We then show that the proposed solution is generic: It can be deployed on any mobile network and it can be implemented either with symmetric or with asymmetric cryptography. We provide a performance analysis by studying the behavior of the solution in various scenarios.

Original languageEnglish
Pages (from-to)43-51
Number of pages9
JournalIEEE Transactions on Mobile Computing
Volume5
Issue number1
DOIs
Publication statusPublished - Jan 2006

Fingerprint

Wireless networks
Network protocols
Radio links
Mobile ad hoc networks
Cryptography
Chemical activation

Keywords

  • Asymmetric cryptography
  • Cryptographic protocols
  • Mobile ad hoc networks
  • Offline certification authority
  • One-hop radio links
  • Peer-to-peer security
  • Performance analysis
  • Security associations
  • Side channel security

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science(all)

Cite this

Mobility helps peer-to-peer security. / Capkun, S.; Hubaux, J. P.; Buttyán, L.

In: IEEE Transactions on Mobile Computing, Vol. 5, No. 1, 01.2006, p. 43-51.

Research output: Contribution to journalArticle

Capkun, S. ; Hubaux, J. P. ; Buttyán, L. / Mobility helps peer-to-peer security. In: IEEE Transactions on Mobile Computing. 2006 ; Vol. 5, No. 1. pp. 43-51.
@article{5ed0e8c625774bd1a1ca70c4b7cd5d34,
title = "Mobility helps peer-to-peer security",
abstract = "We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case, the security protocol runs over one-hop radio links. We further show that mobility can be used for the periodic renewal of vital security information (e.g., the distribution of hash chain/Merkle tree roots). In the second scenario, we consider fully self-organized security: Users authenticate each other by visual contact and by the activation of an appropriate secure side channel of their personal device; we show that the process can be fuelled by taking advantage of trusted acquaintances. We then show that the proposed solution is generic: It can be deployed on any mobile network and it can be implemented either with symmetric or with asymmetric cryptography. We provide a performance analysis by studying the behavior of the solution in various scenarios.",
keywords = "Asymmetric cryptography, Cryptographic protocols, Mobile ad hoc networks, Offline certification authority, One-hop radio links, Peer-to-peer security, Performance analysis, Security associations, Side channel security",
author = "S. Capkun and Hubaux, {J. P.} and L. Butty{\'a}n",
year = "2006",
month = "1",
doi = "10.1109/TMC.2006.12",
language = "English",
volume = "5",
pages = "43--51",
journal = "IEEE Transactions on Mobile Computing",
issn = "1536-1233",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

TY - JOUR

T1 - Mobility helps peer-to-peer security

AU - Capkun, S.

AU - Hubaux, J. P.

AU - Buttyán, L.

PY - 2006/1

Y1 - 2006/1

N2 - We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case, the security protocol runs over one-hop radio links. We further show that mobility can be used for the periodic renewal of vital security information (e.g., the distribution of hash chain/Merkle tree roots). In the second scenario, we consider fully self-organized security: Users authenticate each other by visual contact and by the activation of an appropriate secure side channel of their personal device; we show that the process can be fuelled by taking advantage of trusted acquaintances. We then show that the proposed solution is generic: It can be deployed on any mobile network and it can be implemented either with symmetric or with asymmetric cryptography. We provide a performance analysis by studying the behavior of the solution in various scenarios.

AB - We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case, the security protocol runs over one-hop radio links. We further show that mobility can be used for the periodic renewal of vital security information (e.g., the distribution of hash chain/Merkle tree roots). In the second scenario, we consider fully self-organized security: Users authenticate each other by visual contact and by the activation of an appropriate secure side channel of their personal device; we show that the process can be fuelled by taking advantage of trusted acquaintances. We then show that the proposed solution is generic: It can be deployed on any mobile network and it can be implemented either with symmetric or with asymmetric cryptography. We provide a performance analysis by studying the behavior of the solution in various scenarios.

KW - Asymmetric cryptography

KW - Cryptographic protocols

KW - Mobile ad hoc networks

KW - Offline certification authority

KW - One-hop radio links

KW - Peer-to-peer security

KW - Performance analysis

KW - Security associations

KW - Side channel security

UR - http://www.scopus.com/inward/record.url?scp=32844466166&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=32844466166&partnerID=8YFLogxK

U2 - 10.1109/TMC.2006.12

DO - 10.1109/TMC.2006.12

M3 - Article

AN - SCOPUS:32844466166

VL - 5

SP - 43

EP - 51

JO - IEEE Transactions on Mobile Computing

JF - IEEE Transactions on Mobile Computing

SN - 1536-1233

IS - 1

ER -