• No results found

Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph

N/A
N/A
Protected

Academic year: 2021

Share "Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Small Worlds in Security Systems: an Analysis of the PGP

Certificate Graph

Srdjan Capkun, Levente Buttydn and Jean-Pierre Hubaux

Laboratory for Computer Communications and Applications (LCA)

School of Information and Communication Sciences (I&C)

Swiss Federal Institute of Technology Lausanne (EPFL)

CH-1015 Lausanne, Switzerland

srdan.capkun @ epfl.ch, levente.buttyan @ epfl.ch, jean-pierre.hubaux @ epfl.ch

ABSTRACT

We propose a new approach to securing self-organized mo- bile ad hoc networks. In this approach, security is achieved in a

fully self-organized manner; by this we mean t h a t the

security system does not require any kind of certification authority or centralized server, even for the initialization phase. In our work,, we were inspired by P G P [15] be- cause its operation relies solely on the acquaintances be- tween users. We show t h a t the small-world phenomenon naturally emerges in the P G P system as a consequence of the self-organization of users. We show this by studying the P G P certificate graph properties and by quantifying its small-world characteristics. We argue t h a t the certificate graphs of self-organized security systems will exhibit a simi- lar small-world phenomenon, and we provide a way to model self-organized certificate graphs. The results of the P G P certificate graph analysis and graph modelling can be used to build new self-organized security systems and to test the performance of the existing proposals. In this work, we refer to such an example.

K e y w o r d s : PGP, small-world graphs, public-key manage- ment, self-organization

1. INTRODUCTION

Security i n computer networks usually relies on central au- thorities, certificate directories, or some preinstalled keys and procedures. However, over the last decade, a very im- portant change of paradigm has occurred: T h e concept of self-organization has appeared in m a n y communication sys- tems. B y self-organization, w e m e a n that the system is oper- ated solely by the end-users. T h e most interesting examples include peer-to-peer systems, such as Gnutella I, Freenet 2 and P-Grid [1]. In addition to the application layer, self- organization has also emerged on the lower layers of the 1 http://www.gnutella.com/

2 h t t p : / / f r e e n e t p r o j e c t .org/

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/of • fee.

New Security Paradigms Workshop '02, September 23-26, 2 0 0 2 , Virginia Beach: Virginia.

Copyright 2 0 0 2 ACM ISBN 1 - 5 8 1 1 3 - 5 9 8 - X / 0 2 / 0 0 0 9 ... $ 5 . 0 0

system architecture. A n excellent example is a mobile ad hoc network, where self-organization appears at the network layer [11, 4, 5]: B y definition, a mobile ad hoc network does not rely on any fixed infrastructure; instead, all network- ing functions (e.g., routing, mobility management, etc.) are performed by the nodes themselves in a self-organizing man- ner.

D u e to the lack of centralized services in self-organized sys- tems, these systems cannot be secured with the existing se- curry solutions. This is not surprising, as these solutions are devised mainly for the traditional wireline networks. Nevertheless, in devising n e w security approaches for self- organized systems, w e use traditional cryptographic prim- itives. In our view, the most appealing tool for securing self-organized systems is public-key cryptography because it enables the establishment of secure communication by the exchange of public information and it supports key and user authentication.

T h e main problem in all public-key security systems is: H o w can a user u obtain the authentic public-key of another user v in the presence of an active attacker [8, 10]? A c o m m o n approach to solving this problem is based on public-key cer- tificates. A public-key certificate is a data structure in which a public-key is bound to an identity (and possibly to some other attributes) by the digital signature of the certificate issuer. O n e of the most c o m m o n approaches is that certifi- cates are issued by a central authority (called certification authority (CA)) that every user trusts. Every user knows the CA's public-key and thus can verify every certificate that the C A issued. In self-organized systems, the functionality of the C A can be distributed to the users, as proposed in [14, 7]. However, distributing the CA's functionality, means del- egating the authority to a subset of users, which makes this approach impractical for fully self-organized systems. In [10], we propose a different solution to the problem of public key management in self-organized systems. In our approach, each user is her own authority domain and users issue public-key certificates to each other. Like in PGP, key authentication is performed via a chain of certificates. By this we mean t h a t the key authentication is done in the following way: W h e n a user u wants to obtain the public key of another user v, she acquires a chain of public-key certificates such t h a t

(2)

1. the first certificate of the chain can be directly verified by u using a public key t h a t u holds and trusts (e.g., her own public key),

2. each remaining certificate can be verified using the public key contained in the previous certificate of the chain, and

3. the last certificate contains the public key of the target user v.

It is assumed t h a t u trusts the issuer of each certificate in the chain to correctly verify t h a t the public key in the certificate indeed belongs to the user name in the certificate.

However, contrary to P G P , our system does not rely on cer- tificate directories for the distribution of certificates. In- stead, certificates are stored and distributed by the users and each user maintains a local certificate repository that contains a limited n u m b e r of certificates selected by the user according to some algorithm. W h e n user u wants to verify the authenticity of the public key of user v, they merge their local certificate repositories, and u tries to find an appropri- ate certificate chain from u to v in the merged repository. W e have shown that there are algorithms for the construc- tion of local certificate repositories such that any pair of users can find, with high probability, certificate chains to each other in their merged repository, even if the size of the local repositories is small compared to the total number of users in the system. This result shows that it is indeed pos- sible to solve the public-key m a n a g e m e n t problem in a fully self-organized yet scalable way. This approach however pro- vides only probabilistic guarantees and is dependent on the characteristics of the certificate graph on which it operates. A certificate graph is a directed graph

G(V,

E), where V is a set of vertices, t h a t represent public keys of the users, and E is a set of edges, t h a t represent public key certificates. More precisely, there is a directed edge from vertex K~ to vertex Ilv if there is a certificate signed with /i= in which K,, is bound to an identity.

In our work, w e assumed that the certificate graphs in self- organized systems exhibit certain properties. Specifically, we assumed that the certificate graphs that might appear in self-organized systems exhibit the small-world phenomenon. A graph exhibits the small-world p h e n o m e n o n if, roughly speaking, any two vertices in the graph are likely to be con- nected through a short sequence of intermediate vertices, T h e small-world p h e n o m e n o n was first introduced by Stan- ley Milgram through a series of pioneering experiments that he and hiscoauthors conducted in the 1960's [9, 12]. T h e goal of the experiments was to find short chains of acquain- tances linking pairs of people in the United States w h o did not k n o w one another. T h e striking result was that the average n u m b e r of intermediate steps in a successful chain was found to lie between five and six. This value has since become popular as the "six degrees of separation" principle. In this paper, we argue t h a t the small-worM phenomenon naturally emerges in self-organized security systems. As an example of such a system, we take PGP, where a certifi- cate graph is created in a fully self-organized manner. We further argue t h a t in self-organized security systems, where

'14

1 . 4 t ~ t~mtfl world

~_.:..l ts~mm

Figure

1: A t r a n s i t i o n f r o m t h e o r d e r e d

graph (I-

lattice) to the random graph.

users issue certificates based on their acquaintances, certifi- cate graphs will exhibit small-world properties as a result of their mutual trust relationships. In order to study different security solutions for self-organized systems, we also propose a certificate graph model. Among other things, our model allows us to construct PGP-like graphs in a random manner for simulation purposes.

A recerit work on small-world graph models suggests sev- eral reasons for the emergence of this phenomenon, both in social networks, and in the World Wide Web [3, 6, 13, 2]. In their work, these authors propose several models of small-world graphs. Naturally, as certificate graphs reflect the social relations between people, they will exhibit similar characteristics. Our analysis of P G P graphs shows that the existing small-wc~rld models only partially model certificate graphs. We therefore propose some modifications to these models, to generate certificate graphs t h a t might appear in self-organized systems.

The four contributions of this work can be summarized as follows: First, we present a detailed study of the charac- teristics of the P G P certificate graphs. To our knowledge, no such study has been made so far. However, an analy- sis of some P G P certificate graph properties is available at

http:///www.pgpi.org

and

http:///pgp.dtype.org.

Second, we

show t h a t these graphs exhibit small-world properties and we argue t h a t P G P is a wonderful source of inspiration to predict the way certificate graphs might emerge in fully self- organized systems. Third, we demonstrate t h a t the exist- ing small-world graph models do not model the certificate graphs appropriately. Fourth, we propose modifications of the existing models to better characterize certificate graphs. The paper is organized as follows. In Section 2, we describe the existing small-world graph models. In Section 3, we present the analysis of the P G P certificate graphs. In Sec- tion 4, we propose a model for the creation of the artificial certificate graphs. In Section 5, we conclude and we give some directions for future work. s

3The work presented in this paper was partially sup- ported by the Swiss National Competence Center in Re-- search on Mobile Information and Communication Systems (www.terminodes.org), a center supported by the Swiss Na- tional Science Foundation under grant n u m b e r 5005-67322.

(3)

2. MODELS OF SMALL-WORLD GRAPHS

Milgram's seminal small-world experiment remains one of the most compelling ways to think about the small-world phenomenon. It succeeds in demonstrating t h a t we are not so far apart from each other and t h a t the world is indeed a very small place.

The small-world phenomenon was recently a matter of an extensive study by Watts. In his book [13], Watts studies the small-world phenomenon and he suggests t h a t small- world graphs lay somewhere in between ordered and com- pletely random graphs. He illustrates this through several small-world graph models, out of which the ¢ model, in our opinion, is the most appealing one. In this model, small- world graphs are created such t h a t an ordered structure (a l-lattice) is rewired randomly. By rewiring the lattice, in- creasing randomness is introduced into a graph and, at the same time, long range edges are created. This is illustrated in Figure 1. These long range edges are called

shortcuts, and

are defined as follows: a shortcut is an edge such t h a t when it is removed, t h e shortest p a t h between the vertices previ- ously connected by t h a t edge becomes strictly larger t h a n two. The fraction of the shortcuts in the total number of edges of a graph is called the ¢ coefficient and it determines the level of randomness of the graph.

Here, a

d-lattice

is a labelled, unweighted, simple graph t h a t is similar to a Euclidean cubic lattice of dimension d in t h a t any vertex v is joined to its lattice neighbors, u~ and wi, as specified by

ui = [(v -

i d') +

n](mod n); w~ = (v + ia')(mod n) where 1 < i <

k/2, 1 < d' < d,

and it is generally assumed t h a t k _> 2d. Here, k is a vertex degree and d is a lattice dimension. Hence, a l-lattice with k = 2 is a ring, a 2-lattice with k ---- 4 is a two dimensional square grid, and so on (see Figure 1 for an example of a l-lattice with k = 4). The ¢ model achieves three important properties of small- world graphs: (i) high clustering, which reflects the fact t h a t small groups of people are very well interconnected and t h a t friends of a same friend are very likely mutual friends as well; (ii) small average distance between two vertices; (iii) logarithmic length scaling, t h a t shows the small-world phenomenon , as for all graph sizes, t h e average length of shortest paths between the vertices is very small compared to the graph size.

These three graph properties are formally expressed through

clustering coe]ficient, characteristic length

and

logarithmic

characteristic length scaling.

The clustering coefficient of a vertex v characterizes the extent to which vertices adjacent to vertex v are adjacent to each other. It is defined as the ratio of t h e number of edges between the vertices adjacent to v to the total number of possible edges between the same group Of vertices. The clustering coefficient of a graph G is then defined as the mean of the clustering coefficients of all the vertices in G. The characteristic length of a graph G is defined as the median of the means of the shortest path lengths connecting each vertex to all other vertices in G. Logarithmic length scaling means t h a t the characteristic length of a graph G scales logarithmically with t h e size of G. ~00000 - ~00000 ~.00000 )00000 ~00000 ~00000 0 11-94 , t , c/ • 2-96 4-97 7-98 time ¢, 10-99 1-01 4-02 F i g u r e 2: T h e e v o l u t i o n o f t h e s i z e o f t h e P G P g r a p h .

Therefore, a graph exhibits small-world properties if it has: (i) a high clustering coefficient, (ii) a small characteristic length, and (iii) a logarithmic characteristic length scaling. One alternative to t h e model put forward by Watts is t h a t t h e small-world phenomenon arises not because there are a few long-range connections in the otherwise short-range structure of a social network, but because there are a few vertices in the graph t h a t have an unusually high degree or are linked to a widely distributed set of neighbors. This ob- servation led to a model, proposed by Kasturirangan in [6], in which the graph construction begins with a 1- dimensional lattice, but instead of rewiring edges, a number of extra ver- tices are added, and are connected to a large number of vertices on the main lattice, chosen at random. This model is still similar to the W a t t s model in t h a t shortcuts will be created between randomly chosen positions on the lattice and this model will also display the small-world effect. Another model of small-world graphs has been proposed by Albert et al. [3]. In their work, the authors analyzed the World Wide Web graph and concluded t h a t the Web is dom- inated by a small number of very highly connected sites. They found t h a t the degree distribution of the W W W graph is a power law: the probability t h a t a node has a degree k is proportional to

1/k p

for some positive p > 1, where p is called the power factor. Therefore, they suggested the following graph model: a normal random graph with an av- erage degree k is rewired such t h a t its degree distribution becomes a power law. In each iteration of this graph con- struction algorithm, a pair of vertices is chosen randomly and an edge is added between them, only if a newly created edge brings the overall degree distribution closer to the re- quired power law. By repeating this process long enough, a graph is generated with the correct power law. But, this graph is in other respects a random graph with a very low clustering coefficient.

The analysis of Adamic [2] confirms t h a t W W W graphs are indeed small-world graphs, but shows t h a t these graphs do have a larger clustering coefficient t h a n random graphs. She concludes t h a t from this point of view, Albert's model is unrealistic for the modelling of W W W graphs.

(4)

14000 .~ 12000 i _ _ 8O00 6O00 4000 2000 0 11-94 2-96 4-97 7-98 10-99 1-01 4-02 time F i g u r e 3: T h e e v o l u t i o n o f t h e size o f t h e l a r g e s t s t r o n g l y c o n n e c t e d c o m p o n e n t o f t h e P G P g r a p h .

3. ANALYSIS OF THE PGP CERTIFICATE

GRAPH

In the introduction, we explained our motivation for explor- ing the characteristics of the certificate graphs for the pro- vision of security services in self-organized systems. In this section, we present the analysis of the P G P certificate graphs t h a t is, to our knowledge, the only known example of a self- organized certificate graph creation.

We extracted the database containing the P G P certificate graph from the public P G P certificate directories. One of these directories can be found at http://pgp.dtype.org. This database contains the information about public-keys and public-key certificates issued and revoked from the launch of the P G P project (early 1990's) until today. This infor- mation enables us to follow the evolution of the P G P certifi- cate graph and to observe its characteristics as they change • over this time period. The graph analysis t h a t w e present makes sense only if connected graphs are analyzed. There- fore, in our analysis, we focus on the characteristics of the largest strongly connected component of the P G P certificate graphs. The evolution of the sizes of b o t h the P G P certifi- cate graph and its largest strongly connected component is shown in Figures 2 and 3. Observing the characteristics of the second largest strongly connected component of the P G P certificate graph did not make sense as it contained few vertices (32 vertices, for the 2001 P G P graph). To show t h a t the P G P certificate graphs exhibit small-world properties, we observed the following graph characteristics of its largest strongly connected component:

• directed clustering coe~cient • directed C-coefficient • directed characteristic length

• graph diameter • length scaling

• vertex degree distribution

• median and mean in-degree and out-degree • largest strongly connected component size

7 6.5 6

5.5 5 - 4.5 4 3.5 3 500 i i i i i 2500 4500 6500 8500 10500 12500 graph size F i g u r e 4: T h e d i r e c t e d c h a r a c t e r i s t i c l e n g t h o f t h e l a r g e s t s t r o n g l y c o n n e c t e d c o m p o n e n t o f t h e P G P g r a p h .

where directed C-coefficient and directed characteristic length are generalizations of the W a t t s [13] definitions of the same graph characteristics to directed graphs. The directed ¢ co- eI~cient is defined as a fraction of directed shortcuts in the total number of edges. The directed shortcut is defined as a directed edge t h a t , when it is removed, the shortest directed

p a t h (in the same direction as the edge t h a t is removed) be- tween two nodes previously connected by t h a t edge becomes strictly larger t h a n two. The directed characteristic length

of a graph G is defined as the median of the means of the

directed shortest p a t h lengths connecting each vertex to all other vertices in G.

The results of our analysis, presented on Figures 4, 5 and 6, show t h a t P G P certificate graphs have (i) a small directed characteristic length, (ii) a high clustering coefficient, and (iii) slower t h a n logarithmic length sealing. These results clearly show t h a t the P G P certificate graphs do exhibit small-world characteristics.

A high C-coefficient (Figure 6) can be explained by the fact t h a t the t r u s t relationships in the P G P community are often created between very distant (e.g. geographically distant) users. Figure 7 shows the P G P certificate graph diameter. To compare P G P graphs with the graphs generated by the existing small-world models, we investigated the in-degree, out-degree and degree distributions of the P G P certificate graphs. The results of this analysis are shown on Figure 9. Clearly, the vertex degree distribution of the P G P graph is neither bimodal (like in Kasturirangani's small-world model), nor does it obey the power law (like in Albert's small-world model), nor do all vertices have approximately the same de- grees (like in W a t t s ' C-model), b u t it resembles to the Zipf's distribution. Zipf's law, named after the Harvard linguistic professor George Kingsley Zipf (1902-1950), is the observa- tion t h a t frequency Of occurrence of some event (P), as a function of the rank (k) when t h e rank is determined by the above frequency of occurrence, is a power-law function Pk ~ 1/k p with the exponent p close to unity.

(5)

0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 • • O O • • • • • • • • • • • • • • 2000 4000 6000 8000 I0000 12000 graph size F i g u r e 5: T h e d i r e c t e d c l u s t e r i n g c o e f f i c i e n t o f

the

l a r g e s t s t r o n g l y c o n n e c t e d c o m p o n e n t o f t h e P G P g r a p h . 0.25 0.2 0.15 0.1 0.05 0 O 0 • • • • • • • • • • • 2000 4000 6000 8000 I0000 12000 graph size F i g u r e 6: T h e d i r e c t e d ~b-coefficient o f t h e l a r g e s t s t r o n g l y c o n n e c t e d c o m p o n e n t o f t h e P G P g r a p h .

4. CONSTRUCTING A MODEL OF THE

CERTIFICATE GRAPH

In the previous section, w e studied the characteristics of the P G P certificate graphs, as these graphs represent the closest existing example to the certificate graph creation in fully self-organized systems. In this section w e propose a model for the generation of this kind of graphs, which will m a k e it possible to generate certificate graphs of an arbitrary size. Here, w e argue that the certificate graphs in self-organized systems will exhibit small-world properties, as the creation of the certificate graphs depends on the existing trust re- lationships between people. In self-organized systems, if users are properly stimulated, their mutual acquaintances will eventually result in public-key certificates. W e do not claim that the certificate graph will precisely m a p users' ac- quaintances, as the certificates do not express friendship, but the user confidence in a given user-key binding. It is how- ever, reasonable to expect that most of the acquaintances will result in public-key certificates. It has been already shown by Milgram's experiment and argued in [13] that peo- ple's acquaintances do form a small-world graph. All this gives us reasonable assurance that the certificate graphs in self-organized systems will closely resemble graphs of user acquaintances. T h e presented P G P certificate graph anal- ysis gives us additional assurance in our claim that certifi- cate graphs in self-organized systems are indeed small-world graphs. Here, w e do not consider the certificate graph cre- ation where users are given other incentives, besides their acquaintances, to issue public key certificates, as these in- centives could unpredictably change the certificate graphs. As already discussed at the end of the previous section, the existing small-world graph models generate certificate graphs with unrealistic degree distributions. Even without observing specifically the P G P certificate graphs, it seems very counterintuitive that all the people have an approxi- mately equal n u m b e r of acquaintances, like it is proposed in the Watts model. It is more realistic to assume that, like in the P G P degree distribution, a majority of people have a small n u m b e r of acquaintances, fewer people have more acquaintances, and just a few people are very well so- cially connected and have a large n u m b e r of acquaintances.

30 25 20 15 10 5 0 $ @ @ $ $ @ $ • O O i i i i i r i 0 2000 4000 6000 8000 10000 12000 14000 graph size

Figure 7:

T h e d i a m e t e r o f t h e

largest strongly

c o n - n e c t e d c o m p o n e n t o f t h e P G P

graph.

Albert's model, on the other hand, takes into account the vertex degree distribution, but the graphs generated by this model are r a n d o m graphs with a small clustering coefficient.

For the reasons stated above, we find t h a t the existing small- world graph models do not correctly model certificate graphs. Therefore, we propose a new model for the generation of small-world certificate graphs, which we call

certificate graph

model.

This model generates certificate graphs t h a t have: (i) a small characteristic length t h a t scales logarithmically or slower t h a n logarithmically with the size of the graph, (ii) a high clustering coefficient and (iii) predefined in-degree, out-degree and degree distrib itious, similar to those of the P G P certificate graphs.

O u r certificate graph model follows the same logic as Watts ~model, as it singles out shortcuts as the main cause of the small-world effect. However, in our model, w e use a different substrate. Instead of rewiring a regular 1-1attice, where each vertex has the same degree, w e rewire an irregular lattice-like graph in the same fashion as in the ~model. B y irregular w e m e a n that vertices on that graph do not necessarily have the same degrees.

(6)

10000 o 1000 "~ 100 lO ~ o [] ° • indegree ° [] outdegree [] o o o o 10 100 degree (log)

Figure 8: T h e in-degree, out-degree and degree dis- tributions o f t h e small-world certificate graph gener- ated by t h e certificate graph m o d e l , w i t h t h e m o d e l parameters t h a t m a t c h t h e characteristics o f t h e P G P S e p t e m b e r 2001 certificate graph.

We construct our substrate graph in the following way:

• Given a set V of vertices and given in-degree

kinv

and out-degree

koutv

for each v E V.

• every vertex v is joined to its neighbors uk and wk as specified by:

forall v E V

k = O

f o r i - ~ l t o l V I

= [(v - i) + IVl]

(mod

IVl) if

indeg(u) _< kinu,

then uk = u

a n d k = k + l

if

k > Lkout~/2J

then stop k = 0

for i = 1 to IVI

w = (v + i) (rood

IVI);

if

indeg(w) < kin~,

then wk = w a n d k = k + l

if

k _> [kout,,/2J

then stop

The obtained substrate graph is created in the same fashion as the l-lattice, but with a specified degree distribution. We call a graph generated by this construction an

irregular

lattice.

Here, we define our certificate graph model:

1. Construct an irregular lattice graph according to the predefined degree distribution.

2. Specify a desired ¢.

3. "Randomly rewire" the irregular lattice with the con- straint t h a t ¢ . IEI of its edges are forced to b e short- c u t s . Specifically: 10000 "~ 1000 o ~ 100

~

lO

1 • indegree n A 0^ outdeRree o[] egree 0 0" "0~ 10 100 degree (log) Figure 9: I n - d e g r e e , o u t - d e g r e e a n d d e g r e e distribu- tions o f t h e l a r g e s t s t r o n g l y c o n n e c t e d c o m p o n e n t o f t h e 2001 P G P g r a p h .

(a) Pick a vertex u at random

(b) Pick a neighbor v such t h a t an edge between u and v is not a shortcut.

(c) Delete edge (u, v)

(d) Create shortcut (u, w), such t h a t w is chosen ran- domly

(e) Choose a non-shortcut edge e connected to w (f) Disconnect e from w and connect it to v

We validated our model by generating artificial certificate graphs with input parameters t h a t are similar to those of the P G P certificate graphs. As a predefined degree distri- bution, we used the approximation of the vertex degree dis- tributions of the P G P certificate graphs. The other graph construction parameters (number of vertices and edges, ¢ coefficient) were taken from the characteristics of the P G P certificate graphs.

We generated 18 artificial certificate graphs with the con- struction parameters obtained from 18 different P G P graphs (1996-2001, three graphs from each year). We repeated this experiment 20 times for each set of characteristics. The re- sults of our simulations are shown in the Figures 8, 10 and 10.

In Figure 8 we display the degree distributions of the certifi- cate graph generated with the same parameters as in the P G P September 2001 certificate graph and with the ap- proximation of the vertex degree distribution as previously described. This figure shows t h a t our model successfully generates graphs with given vertex degree distributions. A comparison of clustering coefficients of the P G P graph and the graphs generated by our model is given in Figure 10. We can see t h a t the graphs generated by our model have a slightly larger Clustering coefficient t h e n the P G P certificate graphs. Figure 11 shows t h a t the graphs generated with our model exhibit the same length scaling as the P G P certificate

(7)

1 "~ 0.8

8

0.6 o

°o.:

0 001~0 0 0 0 0 0 0 t o o l 3 D O D [] • e G O • 0 0 0 0 0 O 0 0 0' • P G P c e r t i f i c a t e g r a p h o a r t i f i c i a l c e r t i f i c a t e g r a p h s r ~ i [ i i i 0 2000 4000 6000 8000 10000 12000 14000 graph size F i g u r e 10: D i r e c t e d c l u s t e r i n g c o e f f i c i e n t s o f P G P g r a p h s a n d a r t i f i c i a l g r a p h s g e n e r a t e d b y t h e c e r - t i f i c a t e g r a p h m o d e l w h e n t h e a r t i f i c i a l g r a p h s a r e g e n e r a t e d w i t h t h e s a m e m o d e l p a r a m e t e r s a s P G P g r a p h s .

graph and a very small characteristic length. These results demonstrate t h a t with the proposed certificate graph model we can successfully generate artificial certificate graphs of arbitrary size and of appropriate graph characteristics.

5. CONCLUSIONS AND FUTURE WORK

In this paper, we have observed the emergence of the small- world phenomenon in fully self-organized systems, and its significance to system security. As self-organized security systems do not exist today, it is difficult to predict what the characteristics of the certificate graphs t h a t would be created in these systems will be. Fortunately, P G P provides a very useful analogy and reveals the way in which certificate graphs will likely emerge in fully self-organized systems. This paper provides a detailed analysis of the P G P certifi- cate graph. It shows t h a t P G P certificate graphs exhibit small-world characteristics. It provides a study of the appro- priateness of existing small-world graph models for the rep- resentation of these kind of graphs. It concludes t h a t some modifications to the existing models are necessary and pro- poses the corresponding modifications. The proposed model can be used to construct certificate graphs of any size. In terms of future work, we intend to study in more detail the mechanisms by which t r u s t emerges in fully self-organized systems. In this way, we can check to w h a t extent the P G P certificate graph is really representative. We believe t h a t this analysis can be a n excellent basis to devise and compare solutions to the challenging problem of providing security in fully self-organized systems.

6. ACKNOWLEDGMENTS

The authors would like to t h a n k LCA diploma student Ivan M i t e r for his contribution to this work.

7. REFERENCES

[1] K. Aberer, M. P u n c e w , M. Hauswirth, and It. Schmidt. Gridella, a P 2 P system based on the P-Grid approach, improves on Gnutella's search

.p, 8 6 2 0 . . . . . . o 13 ot:i3o o u o o o • P G P certificate 8 r a p h u artificial certificat g r a p h s 0 2000 4000 6000 8000 10000 12000 14000 graph size F i g u r e 11: D i r e c t e d c h a r a c t e r i s t i c l e n g t h s o f P G P g r a p h s a n d a r t i f i c i a l g r a p h s g e n e r a t e d b y t h e c e r - t i f i c a t e g r a p h m o d e l w h e n t h e a r t i f i c i a l g r a p h s a r e g e n e r a t e d w i t h t h e s a m e m o d e l p a r a m e t e r s as P G P g r a p h s .

performance while

reducing

bandwidth requirements.

IEEE Internet Computing,

2002.

[2] L. Adamic. The small world web. In

Proceedings of the

European Conf. on Digital Libraries,

1999.

[3] It. Albert, H. Jeong, and A.-L. Barabasi. Diameter o f the World Wide Web.

Nature,

401:130-131, 1999. [4] L. BiaS•vial, L. ButtyS.n, S. Capkun, S. Giordano, J.-P.

Hubaux, and J.-Y. Le Boudec. Self-organization in mobile ad hoc networks: The approach of Terminodes.

IEEE Communications Magazine,

J u n e 2001. [5] J. J u b i n and J. Turnow. The D A R P A packet radio

project.

Proceedings of the IEEE,

1987.

[6] It. Kasturirangan. Multiple scales in small-world networks. In

MIT A I Lab Memo 1663,

1999. [7] J. Kong, P. Zerfos, H.Luo, S. Lu, and L. Zhang.

Providing robust and ubiquitous security support for mobile ad-hoc networks. In

Proceedings of the Int.

conference on Network Protocols,

2001.

[8] A. Menezes, P. van Oorschot, and S. Vanstone.

Handbook of Applied Cryptography.

CRC Press, 1997. [9] S. Milgram. The small world problem. In

Psychology

Today,

volume 61, 1967.

[10] J.-P. Hubaux, L. Butty~.n, and S. (~apkun. The quest for security in mobile ad hoc networks. In

Proceedings

of MOBIHOC,

2001.

[11] J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli. Toward self-organized mobile ad hoc networks: The Terminodes Project.

IEEE

Communications Magazine,

J a n u a r y 2001.

[12] J. Travers and S. Milgram. An experimental study of the small world problem. In

Sociometry,

volume 32, 1969.

[13] D. Watts.

Small Worlds.

Princeton University Press, 1999.

(8)

[14] L. Zhou and Z. Haas. Securing ad hoc networks.

IEEE Network,

13(6):24-30, November/December 1999.

[15] P. Zimmermann.

The O~ieial PGP User's Guide.

MIT

References

Related documents

Flat pattern view: Only as visual reference - Not cutting geometry If nothing else stated, 3D model geometry applies.. DENNA RITNING ÄR SVEBA-DAHLEN AB:S EGENDOM SKYDDAD ENLIGT

Consumers have several methods with which they can make payments online, including: credit card; scheme debit card; BPAY; internet-banking transfers; and the specialised online

In case a notary office terminates its operation under Point b, Clause 1 of this Article, within 7 working days after a decision on revocation of the notary office’s

Orders for PORON Condux Plus materials require a forecast in advance of order placement.. Order Acknowledgment – All orders are subject to written acceptance

Research on solutions to sparse symmetric positive definite systems of linear equations has focused primarily on methods based on the Cholesky factoriza- tion, and we have followed

Section 4 reviews the standard approach to games with incomplete information and analyses the Bayes Nash equilibria under a bivariate belief environment in which each agent receives

This evidence suggests that it is crucial to explicitly account for the level, the cyclicality and the endogenous reaction of worker flow rates to changes in labor market policies

One can classify these strategies into organizational, technical, and people strategies; Organizational strategies for promoting ERP implementation success include change