DocumentCode :
2450191
Title :
Personal Marks and Community Certificates: Detecting Clones in Wireless Mobile Social Networks
Author :
Barbera, Marco V. ; Mei, Alessandro
Author_Institution :
Comput. Sci. Dept., Sapienza Univ. of Rome, Rome, Italy
fYear :
2012
fDate :
16-18 May 2012
Firstpage :
83
Lastpage :
91
Abstract :
We consider the problem of detecting clones in wireless mobile ad-hoc networks. We assume that one of the devices of the network has been cloned. Everything, including saved passwords, certificates and secret keys. We propose a solution in networks of mobile devices carried by individuals - composed by nodes that can communicate by short-range technology like bluetooth or Wi-Fi, and links appear and disappear according to social relationships between users. Our idea is to use social physical contacts, securely collected by wireless personal smart phones, as a biometric way to authenticate the owner of the device and detect the clone attack. We introduce two mechanisms: Personal Marks and Community Certificates. Personal Marks is a simple cryptographic protocol that works well when the adversary is an insider, a malicious node in the network that tries to use the stolen credentials in the social community of the original device that has been cloned. Community Certificates works well when the adversary is an outsider, a node that has the goal of using the stolen credentials when interacting with other nodes that are far in the social network from the original device. When combined, these mechanisms provide an excellent protection against this very strong attack. We prove our ideas and solutions with extensive simulations in both simulated and real world scenarios - with mobility traces collected in a real life experiment.
Keywords :
Bluetooth; cryptographic protocols; mobile ad hoc networks; telecommunication security; wireless LAN; Wi-Fi; biometric way; bluetooth; certificates; clone attack; clone detection; community certificates; cryptographic protocol; malicious node; mobile devices networks; mobility traces; passwords; personal marks; secret keys; short-range technology; social network; social relationships; wireless mobile ad-hoc networks; wireless mobile social networks; wireless personal smart-phones; Cloning; Communities; Cryptography; Mobile communication; Mobile computing; Peer to peer computing; Protocols; Delay tolerant networks; clone detection; community authentication; pocket switched networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1693-4
Type :
conf
DOI :
10.1109/DCOSS.2012.22
Filename :
6227728
Link To Document :
بازگشت