You are on page 1of 5

On Demand Self-Organized Public Key

Management for Mobile Ad Hoc Networks


Hisham Dahshan and James Irvine
Department of Electronic & Electrical Engineering
University of Strathclyde
Email: hisham.dahshan@strath.ac.uk, j.m.irvine@strath.ac.uk

Abstract—A mobile ad hoc network MANET is a self-organized according to an appropriate algorithm. Key authentication is
wireless network where mobile nodes can communicate with performed via chains of certificates. However, this scheme
each other without reliance on a centralized authority. Security suffers from the delay and the large amount of traffic required
solutions for traditional networks are not suitable for MANETs
due to the infrastructureless nature and the absence of central- to collect certificates. Ren et al. in [4] proposed a distributed
ized administration. Key management through accessing trusted trust model based on introducing a secret dealer to accomplish
authorities or centralized servers are infeasible for MANETs trust initialization in the system bootstrapping phase to over-
due to the absence of any infrastructure, frequent mobility, and come the problem of delayed trust establishment appeared in
wireless link instability. In this paper we propose an on demand, [3]. In this scheme a secret dealer provides each node with a
self-organized, public key management for MANETs based on
the existence of a web of trust between mobile nodes forming secret short list that includes a number of entries, each entry
the network. The proposed scheme allows each user to create its contains a binding of node identifier and its corresponding
public key and the corresponding private key, to issue certificates public key: (ID, Pk ). After receiving the short list, each node
to neighboring nodes, and to perform public key authentication starts to issue certificates for the received bindings and store
without relying on any centralized authority. Simulation results them locally. The existence of the secret dealer makes the
show that the proposed scheme is efficient and highly robust in
stationary networks and networks with low to high mobility. scheme prone to the centralized administration problems. For
example, it has a single point of attack because if the secret
I. I NTRODUCTION dealer is compromised during the bootstrapping phase, the
A mobile ad hoc network MANET is a self-organized security of the whole system will be at risk. Kitada et al.
wireless network where mobile nodes can communicate with in [5], and [6] considered the problem of certificate chain
each other without reliance on a centralized authority. Each discovery by introducing the Ad hoc Simultaneous Nodes
node is able to communicate with other nodes within its Search protocol (ASNS) to find a certificate chain. In the
transmission range and relays on other nodes to communicate proposed scheme by Kitada et al., each node holds in its
with nodes outside its transmission range. The absence of local repository only certificates issued to it in order to reduce
centralized administration and the infrastructureless nature the memory size and collects certificates by broadcasting
make MANETs good for emerging, military and fast deploy- search packets to chained nodes. The scheme suffers from
ment communications. For these reasons securing MANETs high communication cost because of broadcasting packets with
is hard to achieve. Current security technology provides us certificates. Li et al in [7] proposed a public key management
with some capability to build in a certain level of trust scheme performed by generating a public/private key pair by
into our communication. The trust relationships established the node itself, issuing certificates to neighboring nodes, hold-
between network nodes could be used for the provision of ing these certificates in its certificate repository. This scheme
higher level security solutions, such as key management. In considers only the updated certificate repository to reduce the
[1], and [2], threshold cryptography has been proposed to number of certificates stored in its certificate repository. In
provide a reliable, distributive key management for MANET this paper, we propose an on demand self-organized public
by exploiting some nodes as a trust anchor for the rest of the key management for MANETs. The proposed scheme is based
network. In these schemes, threshold cryptography involves on the existence of a web of trust between mobile nodes
additional computationally intensive modular exponentiation forming the network. The proposed scheme allows each user
compared to the underlined asymmetric-key cryptographic to create its public key and the corresponding private key, to
protocols. Most low-powered wireless nodes do not have the issue certificates to neighboring nodes, and to perform public
resources to handle such computationally intensive operations. key authentication without relying on any centralized authority.
Capkun et al. in [3] proposed a self-organized public key The certificate chain discovery will be performed with the aid
management scheme in which each node issues certificates of the routing process. A measure of the communication cost
independently and manages them at its repository. In this will be proposed. A comprehensive analysis of the proposed
scheme, Certificates are stored and distributed by the nodes scheme in the mobility environment of MANETs will be
and each node maintains a local certificate repository that performed. The rest of the paper is organized as follows:
contains a limited number of certificates selected by the node section II provides the system description and trust model

978-1-4244-2517-4/09/$20.00 ©2009 IEEE 1


Authorized licensed use limited to: Ganadipathy Tulsi Engineering College. Downloaded on August 14,2010 at 08:50:17 UTC from IEEE Xplore. Restrictions apply.
of our proposed scheme, The simulation environment and in the network. If a node u believes that a public key PKi
performance metrics are described in Section III and then belongs to a certain user i, it has to issue a certificate to node
the results are presented in Section IV. Finally Section V i signed by its private key PKu representing its assurance of
concludes the paper. the binding of the user’s identity IDi and its corresponding
public key PKi . Issued certificates to or from the user should
II. T RUST M ODEL AND S YSTEM D ESCRIPTIONS
be stored in its certificate repository with a validity time.
In this section we present an overview of the trust model
2) Certificate Chain Discovery
and the system description of our proposed scheme.
In this process, the certificate chain discovery is performed
A. Trust Model by exploiting the routing infrastructure. We assume that a
The trust model of our proposed scheme is based on the certain number of direct trust relations have been established
existence of public-key certificates as bindings of the public between each node and its neighbors during the network
keys and the corresponding user identities IDs. The certificate initialization. The number of directly trusted nodes per node
should also contain the node’s identity/network address, cer- is assumed to be uniformally distributed. The proposed on
tificate generation and validity dates. We denote CertA→B as demand self-organized public key management scheme work
the certificate signed by node A’s private key SKA to represent in support of an ad hoc on demand routing protocol (such
its assurance in the binding of node B and its public key as AODV [8]). Considering the example in Figure 2, the
PKB . For simplicity we denote Sigi as the digital signature of certificate chain discovery process can be explained as follows:
node i. It is assumed that there exist sparse trust relationships • The source node S sends a route request packet to nodes
among the nodes so that any node that wishes to join the that the source node directly trusts.
network can establish independent trust relationship with some • When a directly trusted node by the source node (such
of the existing member nodes in the network. Each node in the as node U) receives the route request packet from the
network has a certificate repository to store valid certificates source node, it searches for the certificate of the source
it issued or certificates issued to it by other entities. In order node signed by this node in its certificate repository and
for a node A to authenticate the public-key of another node adds it to the route request packet before forwarding the
D as shown in Figure 1, it has to acquire a chain of valid route request packet to nodes it directly trusts as shown
certificates from node A to node D. The first certificate of in the following message.
the chain which is the certificate of a directly trusted node by U→ V : {RREQ,CertU→S }
node A will be verified by node A, by using its public key PKA . • As node V directly trusts the destination node D, it will do
Each remaining certificate in the chain will be verified using the same as node U and forwards the following message
the public key of the previous certificate of the chain. The last to the destination node D.
certificate in the chain holds the public key of the target node V → D : {RREQ,CertU→S , CertV →U }
D. The certificate chain from node A to node D in this example • After receiving the route request packet from node V ,
is {CertA→B , CertB→C , CertC→D }, and the certificate chain the destination node D has the whole certificate chain
from node D to node A is {CertD→C , CertC→B , CertB→A }. required to recover the source node’s public key PKS .
{ PKB , IDB, TG, TV}Sig { PKC , IDC, TG, TV}Sig { PKD, IDD, TG, TV}Sig
A B C

CertA B CertB C CertC D

A B C D

CertB A CertC B CertD C

{ PKA, IDA, TG, TV}Sig { PKB , IDB, TG, TV}Sig { PKC , IDC, TG, TV}Sig
B C D

Figure 1. Certificate Chain

B. System Description
The proposed on demand self-organized public key manage-
ment scheme involves four processes: public key and public-
key certificate generation, certificate chain discovery, certifi-
cate verification, and certificate revocation. We describe our
proposed scheme in detail according to these four processes.
1) Public Key and Public-Key Certificate Generation
In our proposed scheme, each node generates its public key
and the corresponding private key locally before joining the
network by the node itself. Public-key certificates are issued by
Figure 2. Certificate Chain Discovery
the the nodes based on nodes information about other nodes

2
Authorized licensed use limited to: Ganadipathy Tulsi Engineering College. Downloaded on August 14,2010 at 08:50:17 UTC from IEEE Xplore. Restrictions apply.
• The destination node D sends a route reply packet to node which save bandwidth in the first hop. The communication
V. cost of the certificate chain discovery during the route request
• Node V searches in its certificate repository for the phase can be calculated as follows:
certificate of the destination node CertV →D , adds it to the i=h
route reply packet, and forwards the route reply packet Creq (h) = ∑ d i × (i − 1) × cert_size
to node U as shown in the following message. i=2
V → U :{RREP, CertV →D } where h is the average number of hops between the source
• Node U receives the route reply packet from node V , and the destination, d is the average number of trusted nodes
searches for the certificate of node V CertU→V in its per node, and cert_size is the size of the certificate.
certificate repository, adds it to the route reply packet, In the route reply phase, the destination node does not insert
and forwards the route reply packet to the source node S its own certificate in the first hop because this certificate is
as shown in the following message. stored in the certificate repository on nodes it directly trusts
U → S :{RREP, CertV →D , CertU→V } which save bandwidth in the first hop of the route reply.
• The source node S receives the route reply packet from The communication cost in this phase can be calculated as
node U and recovers the public key of the destination follows:
node PKD from the received certificate chain. i=h
If the source node received more than one route reply for Crep (h) = ∑ (i − 1) × d × cert_size
i=2
the same route request, it will choose the route which has
The total communication cost of the certificate chain dis-
the minimum number of certificates. Untrusted nodes such as
covery process will be calculated as follows:
nodes E, H, and Z will not receive the route request packets.
Successful communication result in increasing trust between
Ctotal (h) = Creq (h) +Crep (h)
certificate chain entities and signing more certificates for each
others.
3) Public-Key Certificate Verification i=h
The verification of the public-key certificate is performed Ctotal (h) = ∑ d × (1 + d i−1 ) × (i − 1) × cer_size
i=2
by checking the validity time Tv in the certificates forming
the certificate chain. After verifying the certificates of the B. Simulation Environment
certificate chain the authenticity of the public keys of both the Simulations were performed using Network Simulator (NS-
source and the destination nodes is performed by the certificate 2) [9], particularly popular in the ad hoc networking commu-
chain from the source node to the destination node and vice nity. The MAC layer protocol IEEE 802.11 with a data rate
versa. of 11 Mbps is used in all simulations. The transmission range
4) Public-Key Certificate Revocation is set to 250m. The propagation model is Two Ray Ground.
The total number of nodes is set to 50 nodes in 1000m x
Each node can revoke a certificate it issued if it believes that
1000m network area. The source-destination pairs are spread
the binding between the public key and the node’s identity
randomly over the network. The ns-2 constant bit-rate (CBR)
is no longer valid. Each node can revoke its own certificate
traffic generator is used to set up the connection patterns
if it believes that its private key is compromised. A node
with different random seeds. Each node has one CBR traffic
can revoke a certificate it issued by broadcasting a certificate
connection with a single unique destination and can generate
revocation message to nodes it directly trusts. When a node
at most 10,000 packets. Sources initiation time is uniformly
receives a certificate revocation message, it deletes the revoked
distributed over the first 60 seconds of the simulation time.
certificate from its certificate repository. A node can revoke
The traffic loading is varied between 1 CBR packet/sec and 7
its own certificate by broadcasting a certificate revocation
CBR packets/sec and the data packet size is 512 bytes. The
message to nodes it directly trusts includes the revoked cer-
size of certificates was also set to 512 bytes. The total number
tificate and the new one. When a node receives the certificate
of connections in the network was set to 50 connections.
revocation message it replaces the revoked certificate by the
Every simulation run is 1000 seconds long. The mobgenss
new one.
[10] mobility scenario generator was used to produce random
III. S IMULATION E NVIRONMENT AND P ERFORMANCE mobility patterns. The pause time is set to zero. The Ad Hoc
M ETRICS On-demand Distance Vector (AODV) routing protocol [8] was
A. Communication Cost chosen for the simulations. The simulation results are the
average of 10 runs.
The communication cost of our proposed scheme consists of
two phases; the route request phase and the route reply phase. C. Performance Metrics
In the route request phase, the source node sends the route We have selected the Packet Delivery Ratio, Average End-
request packet to nodes it directly trusts without inserting its To-End Delay, and the Certificate Chain completion probabil-
own certificate in the route request packet as this certificate ity as metrics during the simulation in order to evaluate the
is stored in the certificate repository of nodes it directly trusts performance of the proposed scheme.

3
Authorized licensed use limited to: Ganadipathy Tulsi Engineering College. Downloaded on August 14,2010 at 08:50:17 UTC from IEEE Xplore. Restrictions apply.
IV. S IMULATION R ESULTS
In this section, the simulation results will be presented. In Figures 3, 4, and 5 show that increasing the number of
the simulations we compare the performance of our proposed trusted nodes per node d to 4 at the network initialization
scheme to the performance of the CBR reference which is the makes the packet delivery ratio approaches that of the AODV
simulation of the AODV [8] without any modifications. reference. Figures 6, 7, and 8 show that the end-to-end delay
of our proposed scheme for d equal to 1, and 2 is very low
because of dropped packets due to failures to find certificate
chains, but for d equal to 4 it approaches the end-to-end delay
of AODV reference.

Figure 3. Packet Delivery Ratio PDR % vs Load in packet/s for 0.1 m/s
node mobility

Figure 6. End-to-end Delay in sec vs Load in packet/s for 0.1 m/s node
mobility

Figure 4. Packet Delivery Ratio PDR % vs Load in packet/s for 5 m/s node
mobility
Figure 7. End-to-end Delay in sec vs Load in packet/s for 5 m/s node
mobility

Figure 5. Packet Delivery Ratio PDR % vs Load in packet/s for 20 m/s node Figure 8. End-to-end Delay in sec vs Load in packet/s for 20 m/s node
mobility mobility

4
Authorized licensed use limited to: Ganadipathy Tulsi Engineering College. Downloaded on August 14,2010 at 08:50:17 UTC from IEEE Xplore. Restrictions apply.
Figures 9, 10, and 11 show the certificate chain completion V. C ONCLUSIONS
probability for 0.1 m/s, 5 m/s, and 20 m/s node mobility In this paper, we presented a new on demand self-organized
respectively for d varies from 1 to 6. Increasing the value public key management scheme. The proposed scheme ex-
of d increases the certificate chain completion probability. For ploits the routing infrastructure to discover a certificate chain
d equal to 6, nodes can certainly complete a certificate chain. through a web of trust. A measure of the communication cost
of the certificate chain discovery process has been proposed.
The first contribution of this paper is that our proposed scheme
has low communication cost because each node limits its
search for the certificate chain to its directly trusted nodes only.
The second contribution is concluded from simulation results
which show that the proposed scheme has negligible impact
on the network performance and the scheme is suitable for
stationary networks and networks with low to high mobility.
R EFERENCES
[1] L. Zhou and Z. J. Hass, "Securing ad hoc network", IEEE
network, Vol. 13, no. 6, pp. 24–30, 1999.
[2] S. Yi and R. Kravets, "Moca: Mobile certificate authority
for wireless ad hoc networks", in Proceedings of the 2nd
Annual PKI Research Workshop (PKI 2003), 2003.
Figure 9. Certificate Chain Completion Probability vs Load in packet/s for [3] S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-organized
0.1 m/s node mobility public-key management for mobile ad hoc networks",
IEEE Transactions on Mobile Computing, vol. 2, no. 1,
pp. 52–64, 2003.
[4] K. Ren, T. Lib, Z. Wanb, F. Baob, R. H. Dengb, and K.
Kima, "Highly reliable trust establishment scheme in ad
hoc networks", The International Journal of Computer and
Telecommunications Networking, ElSEVIER, vol. 45, no.
6, pp. 687–699, 2004.
[5] Y. Kitada, Y. Arakawa, "On demand distributed public
key management using routing information for wirelss ad
hoc netwoks", IEICE Transactions on Information and
Systems, vol. J88 D1, no. 10, pp. 1571–1583, October
2005.
[6] Y. Kitada, A. Watanabe, K. Takemori, and I. Sasase, "On
demand distributed public key management for wireless ad
hoc networks", in IEEE Pacific Rim Conference on Com-
Figure 10. Certificate Chain Completion Probability vs Load in packet/s for munications, Computers and Signal Processing (PacRim),
5 m/s node mobility 2005.
[7] H. K. R. Li, J. Li and P. Liu, "Localized public key
management for mobile ad hoc networks", in IEEE Global
Telecommunications Conference (Globecom), 2004, pp.
1284–1289.
[8] C. E. Perkins and E. M. Royer, "Ad-hoc on-demand dis-
tance vector routing", in 2nd IEEE Workshop on Selected
Areas in Communication, New Orleans, LA, 1999, pp.
24–30.
[9] K. Fall and K. Vardhan, "The network simulator (ns-2)",
Available at: http://www.isi.edu/nsnam/ns.
[10] W. Navidi and T. Camp, "Stationary distributions for the
random waypoint mobility model", IEEE Transactions on
Mobile Computing, vol. 3, no. 1, pp. 99–108, 2004.

Figure 11. Certificate Chain Completion Probability vs Load in packet/s for


20 m/s node mobility

5
Authorized licensed use limited to: Ganadipathy Tulsi Engineering College. Downloaded on August 14,2010 at 08:50:17 UTC from IEEE Xplore. Restrictions apply.

You might also like