{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:30Z","timestamp":1750307670077,"version":"3.41.0"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,10]]},"abstract":"<jats:p>Secure bootstrapping of mobile ad hoc networks (MANETs) is a challenging problem in scenarios in which network users (or nodes) do not share trust relationships prior to the network deployment. In recent years, a number of schemes have been proposed to solve this problem, assuming either no or limited trust between the nodes prior to their deployment. Despite numerous proposals, there is no common understanding of the proposed schemes and of the trade-offs that they provide. This has consequences for both researchers and practitioners, who do not have a clear idea how to compare the schemes and how to select a scheme for a given application. In this article, we present a framework that helps in understanding and comparing schemes for secure bootstrapping of MANETs. The framework is general because it is policy-neutral and can accommodate many existing bootstrapping schemes. The proposed framework can equally serve as a good basis for the development of new MANET bootstrapping schemes; we show how the development of the framework leads to two new (classes of) distributed bootstrapping schemes. Within the framework, we not only investigate and characterize the properties of the relevant bootstrapping schemes, but also give methods for practitioners to select the relevant system parameters in the Random Walk and the (Restricted) Random Waypoint mobility models.<\/jats:p>","DOI":"10.1145\/1410234.1410236","type":"journal-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:43Z","timestamp":1225979383000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks"],"prefix":"10.1145","volume":"12","author":[{"given":"Shouhuai","family":"Xu","sequence":"first","affiliation":[{"name":"University of Texas"}]},{"given":"Srdjan","family":"\u010capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]}],"member":"320","published-online":{"date-parts":[[2008,10]]},"reference":[{"unstructured":"Aldous D. J. and Fill A. 2000. Markov chains on graphs. Manuscript under preparation. Aldous D. J. and Fill A. 2000. Markov chains on graphs. Manuscript under preparation .","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of The 2nd USENIX Workshop on Electronic Commerce. The USENIX Association","author":"Anderson R.","key":"e_1_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1016\/S0140-3664(00)00249-8"},{"volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS'02)","author":"Balfanz D.","key":"e_1_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1145\/501436.501438"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04)","author":"Bechler M.","key":"e_1_2_1_6_1"},{"volume-title":"Proceedings of the International Conference on the Theory and Application of Crytographic Techniques (EUROCRYPT'96)","author":"Bellare M.","key":"e_1_2_1_7_1"},{"volume-title":"Proceedings of the International Conference on the Theory and Application of Crytographic Techniques (EUROCRYPT'84)","year":"1984","author":"Blom R.","key":"e_1_2_1_8_1"},{"volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO'92)","author":"Blundo C.","key":"e_1_2_1_9_1"},{"volume-title":"Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT'94)","author":"Brands S.","key":"e_1_2_1_10_1"},{"volume-title":"Tech. Rep. IC\/2004\/16, EPFL-DI-ICA. January.","year":"2004","author":"\u010cagalj M.","key":"e_1_2_1_11_1"},{"doi-asserted-by":"crossref","unstructured":"\u010cagalj M. \u010capkun S. and Hubaux J.-P. 2006. Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE to appear. \u010cagalj M. \u010capkun S. and Hubaux J.-P. 2006. Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE to appear.","key":"e_1_2_1_12_1","DOI":"10.1109\/JPROC.2005.862475"},{"key":"e_1_2_1_13_1","first-page":"483","article-title":"A survey of mobility models for ad hoc network research","volume":"2","author":"Camp T.","year":"2002","journal-title":"Wireless Communications and Mobile Computing: Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications"},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1007\/978-3-540-30108-0_18"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1109\/TMC.2003.1195151"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1145\/778415.778422"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1109\/INFCOM.2004.1354663"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05)","author":"Chan H.","key":"e_1_2_1_18_1"},{"volume-title":"IEEE Symposium on Security and Privacy 2003 (SP'03)","author":"Chan H.","key":"e_1_2_1_19_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.5555\/646334.687813"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1145\/948109.948118"},{"unstructured":"Ellis R. Torus Hitting Times Project. http:\/\/www.math.tamu.edu\/~rellis\/comb\/torus\/torus.html. Ellis R. Torus Hitting Times Project. http:\/\/www.math.tamu.edu\/~rellis\/comb\/torus\/torus.html.","key":"e_1_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1145\/586110.586117"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1137\/0217017"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1109\/ICDCS.2006.52"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1109\/TNET.2002.801403"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'03)","author":"Grossglauser M.","key":"e_1_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1007\/978-3-540-27809-2_22"},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1145\/570645.570648"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1145\/501436.501437"},{"volume-title":"9th International Conference on Network Protocols (ICNP'01)","author":"Kong J.","key":"e_1_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1007\/978-3-540-45146-4_24"},{"doi-asserted-by":"publisher","key":"e_1_2_1_33_1","DOI":"10.1007\/978-3-540-30564-4_21"},{"doi-asserted-by":"publisher","key":"e_1_2_1_34_1","DOI":"10.1145\/948109.948119"},{"doi-asserted-by":"publisher","key":"e_1_2_1_35_1","DOI":"10.1109\/SP.2005.19"},{"volume-title":"11th IEEE International Conference on Network Protocols (ICNP'03)","author":"Narasimha M.","key":"e_1_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_37_1","DOI":"10.1145\/359657.359659"},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.1145\/112600.112605"},{"volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS'02)","author":"Papadimitratos P.","key":"e_1_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_40_1","DOI":"10.1145\/941311.941318"},{"doi-asserted-by":"publisher","key":"e_1_2_1_41_1","DOI":"10.1109\/WMCSA.1994.33"},{"unstructured":"Doyle P. G. and Snell J. L. 2001. Random walks and electric networks. Number 22. Carus Mathematical Monographs. Doyle P. G. and Snell J. L. 2001. Random walks and electric networks . Number 22. Carus Mathematical Monographs.","key":"e_1_2_1_42_1"},{"volume-title":"Proceedings of the IEEE Workshop on Sensor Network Protocols and Applications (SNPA'03)","author":"Shah R. C.","key":"e_1_2_1_43_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1007\/11767480_26"},{"doi-asserted-by":"publisher","key":"e_1_2_1_46_1","DOI":"10.1109\/ICNP.2005.14"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.5555\/647217.760118"},{"unstructured":"TCG. Trusted computing group (tcg) specifications. https:\/\/www.trustedcomputinggroup.org\/home. TCG . Trusted computing group (tcg) specifications. https:\/\/www.trustedcomputinggroup.org\/home.","key":"e_1_2_1_48_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_49_1","DOI":"10.1007\/11535218_19"},{"unstructured":"Wu J. and Wei R. 2005. Comments on \u201cdistributed symmetric key management for mobile ad hoc networks\u201d from infocom 2004. Cryptology ePrint Archive Report 2005\/008. Available at http:\/\/eprint.iacr.org\/. Wu J. and Wei R. 2005. Comments on \u201cdistributed symmetric key management for mobile ad hoc networks\u201d from infocom 2004. Cryptology ePrint Archive Report 2005\/008. Available at http:\/\/eprint.iacr.org\/.","key":"e_1_2_1_50_1"},{"volume-title":"Proceedings of the IEEE Conference on Mobile Ad Hoc and Sensor Systems (MOBIHOC'04)","author":"Xu G.","key":"e_1_2_1_51_1"},{"volume-title":"The 2nd Annual PKI Research Workshop (PKI'03)","author":"Yi S.","key":"e_1_2_1_52_1"},{"volume-title":"Proceedings of the IEEE Conference on Computer Communications (InfoCom'03)","author":"Yoon J.","key":"e_1_2_1_53_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_54_1","DOI":"10.1109\/65.806983"},{"volume-title":"11th IEEE International Conference on Network Protocols (ICNP'03)","author":"Zhu S.","key":"e_1_2_1_55_1"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1410234.1410236","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1410234.1410236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:36Z","timestamp":1750253376000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1410234.1410236"}},"subtitle":["Framework and Constructions"],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["10.1145\/1410234.1410236"],"URL":"https:\/\/doi.org\/10.1145\/1410234.1410236","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2008,10]]},"assertion":[{"value":"2007-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}