skip to main content
article

Suicide for the common good: a new strategy for credential revocation in self-organizing systems

Published:01 July 2006Publication History
Skip Abstract Section

Abstract

We consider the problem of credential revocation in self-organizing systems. In the absence of a common trusted authority, reaching a decision is slow, expensive and prone to manipulation. We propose a radical, new strategy---suicide for the common good---which drastically simplifies the decision-making process and revocation orders. Our mechanism is fully decentralized, incurs low communication and storage overhead, enables fast removal of misbehaving nodes, and is ideally suited to highly mobile networks.

References

  1. S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In EUROCRYPT, pages 344--359, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In MobiHoc, pages 226--236. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Capkun, L. Buttyán, and J.-P. Hubaux. Sector: secure tracking of node encounters in multi-hop wireless networks. In S. Setia and V. Swarup, editors, SASN, pages 21--32. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. Dependable Secur. Comput., 2(3):233--247, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197--. IEEE Computer Society, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Crépeau and C. R. Davis. A certificate revocation scheme for wireless ad hoc networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 54--61, New York, NY, USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. R. Douceur. The Sybil attack. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, IPTPS, volume 2429 of Lecture Notes in Computer Science, pages 251--260. Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks. In EC '04: Proceedings of the 5th ACM conference on Electronic commerce, pages 102--111. ACM Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In S. Setia and V. Swarup, editors, SASN, pages 66--77. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. P. Hancke and M. G. Kuhn. An RFID distance bounding protocol. In IEEE SecureComm 2005, Athens, Greece, 5--9 September 2005, pages 67--73. IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), Apr. 2002. Updated by RFC 4325. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In WWW '03: Proceedings of the twelfth international conference on World Wide Web, pages 640--651. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In ICNP, pages 251--260. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Liu, P. Ning, and W. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In ICDCS, pages 609--619. IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, pages 107--121. Kluwer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Newsome, E. Shi, D. X. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. In K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, editors, IPSN, pages 259--268. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, pages 49--63. IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. SPINS: security protocols for sensor networks. Wirel. Netw., 8(5):521--534, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Serjantov and R. Anderson. On dealing with adversaries fairly. In Proceedings of the Third Annual Workshop on Economics and Information Security, May 2004.Google ScholarGoogle Scholar
  21. L. Xiong and L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In ACM Conference on Electronic Commerce, pages 228--229. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24--30, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Suicide for the common good: a new strategy for credential revocation in self-organizing systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGOPS Operating Systems Review
            ACM SIGOPS Operating Systems Review  Volume 40, Issue 3
            July 2006
            107 pages
            ISSN:0163-5980
            DOI:10.1145/1151374
            Issue’s Table of Contents

            Copyright © 2006 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 July 2006

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader