Accusation Resolution Using Security Metrology
- 545 Downloads
In this paper, we design good security metrology to solve the problem when, in a network, there is a node accusing another one of misbehaving. This problem is not easy because bad nodes tend to use false accusations to disrupt the network and the result is disastrous. We set up a standard, namely the security ratings, and use it to resolve such accusations. We use approaches of negative-credit, and mixed-credit (positive-credit), respectively, to solve this problem. We exclude the use of public key infrastructure and use only symmetric ciphers and hash functions to reduce the computational overhead of the security metrology. Our results prove to be practical and robust against node compromise. The communication and computational overhead also prove to be small and suitable for real world applications.
KeywordsMalicious Node Computational Overhead Message Authentication Code Good Node Hash Chain
Unable to display preview. Download preview PDF.
- 1.U.S. National Institute of Standards and Technology. Federal information processing standards publication 140-1: Security requirements for cryptographic modules (January 1994)Google Scholar
- 2.U.S. National Institute of Standards and Technology. Common criteria for information technology security evaluation, version 2.1 (1999)Google Scholar
- 3.Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, November 1996, pp. 1–11 (1996)Google Scholar
- 4.Dierks, T., Allen, C.: The TLS protocol, version 1.0 (1998), http://www.ietf.org/rfc/rfc2246.txt
- 5.Freeman, W., Miller, E.: An experimental analysis of cryptographic overhead in performance-critical systems. In: The 7th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 1999), College Park, MD, October 1999, pp. 348–357 (1999)Google Scholar
- 6.Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: 6th USENIX Security Symposium Proceedings, San José, California, July 1996, pp. 77–89 (1996)Google Scholar
- 8.Huang, S.C.-H., Makki, S., Pissinou, N.: On optimizing compatible security policies in wireless networks. EURASIP Journal on Wireless Communications and NetworkingGoogle Scholar
- 12.U.S. Department of Defense, Computer Security Center. Trusted computer system evaluation criteria (December 1985)Google Scholar
- 14.Yee, B.S.: Security metrology and the monty hall problem (2001), http://citeseer.ist.psu.edu/yee01security.html
- 15.Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: ACM CCS 2003 (2003)Google Scholar