100 likes | 237 Views
Credential Verification in Mobile Ad-hoc Networks. Team Challenger 2/21/2005. Overview. Description Design Improvements System Analysis Lessons Learned. Description. No Central Authority, so use your friends! Use a friend to verify your credentials. Friend gives you an assertion.
E N D
Credential Verification in Mobile Ad-hoc Networks Team Challenger 2/21/2005
Overview • Description • Design • Improvements • System Analysis • Lessons Learned
Description • No Central Authority, so use your friends! • Use a friend to verify your credentials. • Friend gives you an assertion. • Use this assertion to prove that what you say is true. • As long as there is a friend in common, you can perform transactions with nodes that are not your friends!
Design • Trust Object (Trust Tester) • Key Ring • Black List • Trust Simulator (Trust Sim) • Spawns Trust Object Threads • Observes threads and dumps data to a “dot” file for viewing with GraphViz software.
Improvements • Certificate timestamps • Policies can be established for certificate validation • Blacklisting • Revoking trust from malicious nodes • Junior trust timeouts • Truly temporary trust
System Analysis • Temporary Trust • No blacklisting • Full blacklisting • Partial blacklisting
Temporary Trust/No Blacklisting • sammy 80 arnold helen • arnold 90 sammy brian charlie • brian 50 arnold • charlie 20 arnold helen • helen 30 sammy charlie
Full Blacklisting Eventually everyone that doesn’t have 100% goodness get blacklisted
Partial Blacklisting Will take longer for a node that has a high goodness to be blacklisted
Lessons Learned • Realistic goals very important • Making deadlines and sticking to them • Bug tracking system, a good development environment, and CVS are all essential tools for programmers • Good communication between team members is necessary for higher productivity • Credential verification in ad-hoc networks