Abstract
Consider a network of interconnected nodes where each node is identified with a public key. Each node uses the corresponding private key to sign signalling messages. This allows those nodes that know a given node (by its public key) to verify the authenticity of the signalling messages. Under these circumstances, a node may delegate the right to send signalling messages to another node. The delegation may be expressed, for example, in the form of authorization certificates. In this paper we describe how such delegation could be used to optimise signalling paths in mobile and ad hoc network settings. Additionally, we consider the constraints and limitations of the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87–97. Springer, Heidelberg (1997)
Blaze, M., Feigmenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Conference on Security and Privacy, Oakland, CA (May 1996)
Ellison, C., et al.: SPKI Certificate Theory, RFC 2693, IETF (September 1999)
Rivest, R.L., Lampson, B.: SDSI – A Simple Distributed Security Infrastructure, published several times (1996), http://theory.lcs.mit.edu/~rivest/sdsi10.html
Lehti, I., Nikander, P.: Certifying trust. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, p. 83. Springer, Heidelberg (1998)
Nikander, P.: An Architecture for Authorization and Delegation in Distributed Object-Oriented Agent Systems. Ph.D. Dissertation, Helsinki University of Technology (March 1999)
Abadi, M.: On SDSI’s linked local name spaces. In: Proc. 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June 1997, pp. 98–108. IEEE Computer Society Press, Los Alamitos (1997), http://citeseer.nj.nec.com/abadi98sdsis.html
Howell, J., Kotz, D.: A Formal Semantics for SPKI. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 140–158. Springer, Heidelberg (2000)
Kortesniemi, Y., Hasu, T., Särs, J.: A revocation, validation and authentication protocol for SPKI based delegation systems. In: Proceedings of the 2000 Network and Distributed System Security Symposium (NDSS 2000), San Diego, California, February 2000, pp. 85–101 (2000)
Perlman, R.J.: Network layer protocols with Byzantine robustness. Ph.D. Thesis, Massachusetts Institute of Technology (1988)
Moskowitz, R.: Host Identity Payload Architecture, work in progress, Internet Draft (expired) (February 2001), http://klovia.htt-consult.com/draftmoskowitz-hip-arch-02.txt
Moskowitz, R.: Host Identity Payload and Protocol, work in progress, Internet Draft (November 2001), draft-moskowitz-hip-05.txt http://klovia.httconsult.com/draft-moskowitz-hip-05.txt
Moskowitz, R.: Host Identity Protocol Implementation, work in progress, Internet Draft (expired) (February 2001), draft-moskowitz-hip-impl-01.txt http://klovia.htt-consult.com/draft-moskowitz-hip-impl-01.txt
Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, unpublished manuscript, sent to the manet mailing list, October 08 (2001), ftp://manet.itd.nrl.navy.mil/pub/manet/2001-10.mail
Dahill, B., Levine, B.N., Royer, E., Schields, C.: A Secure Routing Protocol for Ad Hoc Networks., Technical Report UM-CS-2001-037, University of Michigan (August 2001)
Nikander, P.: A Case for the Host Identity Payload: An Architecture for Multi- Homed Mobile Hosts. Unpublished manuscript submitted for consideration to be published at Mobicom 2002, Ericsson Research (March 2002)
Aura, T., Arkko, J.: MIPv6 BU Attacks and Defenses, work in progress, Internet Draft (February 2002) draft-aura-mipv6-bu-attacks-01.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nikander, P., Arkko, J. (2004). Delegation of Signalling Rights. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive