Australian Information Security Management Conference

Document Type

Conference Proceeding

Publisher

SRI Security Research Institute, Edith Cowan University, Perth, Western Australia

Comments

Originally published in the Proceedings of the 11th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 2nd-4th December, 2013

Abstract

Truly Ad Hoc wireless networks where a spontaneous formation of a network occurs and there is no prior knowledge of nodes to each other present significant security challenges, especially as entirely online configuration of nodes with encryption keys must be performed. Utilising threshold cryptography in this type of MANET can greatly increase the security by requiring servers to collaborate to form a single Certificate Authority (CA). In this type of CA responsibility for certificate services is shared between a threshold of servers, greatly increasing security and making attack against the CA considerably more difficult. Choosing which nodes to take on the role of a CA server can have a significant impact on the efficiency of the network, and the success of certificate requests. This research uses simulation to test different rules for choosing nodes to become servers based on their location within the network. Results show that choosing the best server location rules for particular configurations is essential in ensuring both robust security and efficient running of the network.

DOI

10.4225/75/57b56855cd8e7

Share

 
COinS