Download presentation
Presentation is loading. Please wait.
Published byBrianna Dawson Modified over 8 years ago
1
Credential Verification in Mobile Ad-hoc Networks Team Challenger 2/21/2005
2
Overview Description Description Design Design Improvements Improvements System Analysis System Analysis Lessons Learned Lessons Learned
3
Description No Central Authority, so use your friends! No Central Authority, so use your friends! Use a friend to verify your credentials. Use a friend to verify your credentials. Friend gives you an assertion. Friend gives you an assertion. Use this assertion to prove that what you say is true. Use this assertion to prove that what you say is true. As long as there is a friend in common, you can perform transactions with nodes that are not your friends! As long as there is a friend in common, you can perform transactions with nodes that are not your friends!
4
Design Trust Object (Trust Tester) Trust Object (Trust Tester) Key Ring Key Ring Black List Black List Trust Simulator (Trust Sim) Trust Simulator (Trust Sim) Spawns Trust Object Threads Spawns Trust Object Threads Observes threads and dumps data to a “dot” file for viewing with GraphViz software. Observes threads and dumps data to a “dot” file for viewing with GraphViz software.
5
Improvements Certificate timestamps Certificate timestamps Policies can be established for certificate validation Policies can be established for certificate validation Blacklisting Blacklisting Revoking trust from malicious nodes Revoking trust from malicious nodes Junior trust timeouts Junior trust timeouts Truly temporary trust Truly temporary trust
6
System Analysis Temporary Trust Temporary Trust No blacklisting No blacklisting Full blacklisting Full blacklisting Partial blacklisting Partial blacklisting
7
Temporary Trust/No Blacklisting sammy 80 arnold helen sammy 80 arnold helen arnold 90 sammy brian charlie arnold 90 sammy brian charlie brian 50 arnold brian 50 arnold charlie 20 arnold helen charlie 20 arnold helen helen 30 sammy charlie helen 30 sammy charlie
8
Full Blacklisting Eventually everyone that doesn’t have 100% goodness get blacklisted
9
Partial Blacklisting Will take longer for a node that has a high goodness to be blacklisted
10
Lessons Learned Realistic goals very important Realistic goals very important Making deadlines and sticking to them Making deadlines and sticking to them Bug tracking system, a good development environment, and CVS are all essential tools for programmers Bug tracking system, a good development environment, and CVS are all essential tools for programmers Good communication between team members is necessary for higher productivity Good communication between team members is necessary for higher productivity Credential verification in ad-hoc networks Credential verification in ad-hoc networks
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.