Bootstrapping security associations in opportunistic networks

Abdullatif Shikfa, Melek Onen, Refik Molva
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, we analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. We then present a specific key management scheme that enables the bootstrapping of local, topology-dependent security associations between a node and its neighbors along with the discovery of the neighborhood topology, thanks to the use of pseudonym
more » ... tificates and encapsulated signatures. This key management solution relies on two phases: a first phase where nodes are connected to an Identity Manager that provides them with unique pseudonyms to prevent Sybil attacks, and a second phase where the opportunistic communication and the security associations bootstrapping take place without the need for the Identity Manager. This solution with an offline Identity Manager is well-suited to opportunistic networks and can be used as an anchor to provide end-to-end confidentiality based on local and self-organized key management. Keywords-opportunistic networks; pairwise key management; peer-to-peer key management; security associations.
doi:10.1109/percomw.2010.5470676 dblp:conf/percom/ShikfaOM10 fatcat:l36xkmvbargthgdemzowxmsz64