TY - GEN
T1 - Optimal revocations in ephemeral networks
T2 - 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2010
AU - Bilogrevic, Igor
AU - Manshaei, Mohammad Hossein
AU - Raya, Maxim
AU - Hubaux, Jean Pierre
PY - 2010
Y1 - 2010
N2 - Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networks - a class of extremely volatile wireless networks with short-duration and short-range communications - based on a game-theoretic approach. First, by providing incentives, we can guarantee the successful revocation of the malicious nodes even if they collude. Second, thanks to the records of past behavior, we dynamically adapt the parameters to nodes' reputations and establish the optimal Nash equilibrium (NE) on-the-fly, minimizing the social cost of the revocation. Third, based on the analytical results, we define a unique optimal NE selection protocol and evaluate its performance through simulations. We show that our scheme is effective in quickly and efficiently removing malicious devices from the network.
AB - Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networks - a class of extremely volatile wireless networks with short-duration and short-range communications - based on a game-theoretic approach. First, by providing incentives, we can guarantee the successful revocation of the malicious nodes even if they collude. Second, thanks to the records of past behavior, we dynamically adapt the parameters to nodes' reputations and establish the optimal Nash equilibrium (NE) on-the-fly, minimizing the social cost of the revocation. Third, based on the analytical results, we define a unique optimal NE selection protocol and evaluate its performance through simulations. We show that our scheme is effective in quickly and efficiently removing malicious devices from the network.
KW - Ephemeral networks
KW - Game theory
KW - Social optimum
KW - Wireless security
UR - http://www.scopus.com/inward/record.url?scp=77955874962&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955874962&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:77955874962
SN - 9781424475254
T3 - WiOpt 2010 - 8th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
SP - 21
EP - 30
BT - WiOpt 2010 - 8th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Y2 - 31 May 2010 through 4 June 2010
ER -