• DocumentCode
    2450191
  • Title

    Personal Marks and Community Certificates: Detecting Clones in Wireless Mobile Social Networks

  • Author

    Barbera, Marco V. ; Mei, Alessandro

  • Author_Institution
    Comput. Sci. Dept., Sapienza Univ. of Rome, Rome, Italy
  • fYear
    2012
  • fDate
    16-18 May 2012
  • Firstpage
    83
  • Lastpage
    91
  • Abstract
    We consider the problem of detecting clones in wireless mobile ad-hoc networks. We assume that one of the devices of the network has been cloned. Everything, including saved passwords, certificates and secret keys. We propose a solution in networks of mobile devices carried by individuals - composed by nodes that can communicate by short-range technology like bluetooth or Wi-Fi, and links appear and disappear according to social relationships between users. Our idea is to use social physical contacts, securely collected by wireless personal smart phones, as a biometric way to authenticate the owner of the device and detect the clone attack. We introduce two mechanisms: Personal Marks and Community Certificates. Personal Marks is a simple cryptographic protocol that works well when the adversary is an insider, a malicious node in the network that tries to use the stolen credentials in the social community of the original device that has been cloned. Community Certificates works well when the adversary is an outsider, a node that has the goal of using the stolen credentials when interacting with other nodes that are far in the social network from the original device. When combined, these mechanisms provide an excellent protection against this very strong attack. We prove our ideas and solutions with extensive simulations in both simulated and real world scenarios - with mobility traces collected in a real life experiment.
  • Keywords
    Bluetooth; cryptographic protocols; mobile ad hoc networks; telecommunication security; wireless LAN; Wi-Fi; biometric way; bluetooth; certificates; clone attack; clone detection; community certificates; cryptographic protocol; malicious node; mobile devices networks; mobility traces; passwords; personal marks; secret keys; short-range technology; social network; social relationships; wireless mobile ad-hoc networks; wireless mobile social networks; wireless personal smart-phones; Cloning; Communities; Cryptography; Mobile communication; Mobile computing; Peer to peer computing; Protocols; Delay tolerant networks; clone detection; community authentication; pocket switched networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4673-1693-4
  • Type

    conf

  • DOI
    10.1109/DCOSS.2012.22
  • Filename
    6227728