4.5 Article

Enabling individually entrusted routing security for open and decentralized community networks

期刊

AD HOC NETWORKS
卷 79, 期 -, 页码 20-42

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.adhoc.2018.06.014

关键词

Routing; Trust; Decentralized security; Multi-topology; Cooperation; Mesh networks; Community networks

资金

  1. European Community Framework Programme 7 (FP7) within the FIRE Initiative
  2. Community Networks Testbed for the Future Internet (CONFINE) [FP7-288535]
  3. H2020 Programme netCommons [H2020-688768]
  4. Spanish government [TIN2013-47245-C2-1-R, TIN2016-77836-C2-2-R]

向作者/读者索取更多资源

Routing in open and decentralized networks relies on cooperation. However, the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals is a challenge. Community-mesh networks are good examples of such environments due to their open structure, decentralized management, and ownership. As a result, existing community networks are vulnerable to various attacks and are seriously challenged by the obligation to find consensus on the trustability of participants within an increasing user size and diversity. We propose a practical and novel solution enabling a secured but decentralized trust management. This work presents the design and analysis of securely-entrusted multi-topology routing (SEMTOR), a set of routing-protocol mechanisms that enable the cryptographically secured negotiation and establishment of concurrent and individually trusted routing topologies for infrastructure-less networks without relying on any central management. The proposed mechanisms have been implemented, tested, and evaluated for their correctness and performance to exclude non-trusted nodes from the network. Respective safety and liveness properties that are guaranteed by our protocol have been identified and proven with formal reasoning. Benchmarking results, based on our implementation as part of the BMX7 routing protocol and tested on real and minimal (OpenWRT, 10 Euro) routers, qualify the behaviour, performance, and scalability of our approach, supporting networks with hundreds of nodes despite the use of strong asymmetric cryptography. (C) 2018 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据