New Cryptographic Protocols For Wireless Ad Hoc Networks

Post on 18-Dec-2014

1.032 views 1 download

description

Presentation on new cryptographic protocols for wireless Ad-hoc networks

Transcript of New Cryptographic Protocols For Wireless Ad Hoc Networks

Keywords: Computer Networks, cryptography and Network Security, Key Management,

Wireless Ad Hoc Networks.

New cryptographic protocols for

wireless ad hoc networks

Lawrence, Pavan, and Sirija

Wireless ad-hoc network A wireless ad-hoc network is a self-

configuring network of mobile nodes ( or hosts).

An arbitrary topology without a fix infrastructure.

Suitable for military and emergency situations:-natural or human-induced disasters, -emergency medical conditions or -military operations

Civilian environment:-classrooms, meeting rooms, sports stadiums

Wireless ad-hoc network Topology

From Wikipedia, the free encyclopedia

Ad-Hoc Network Configurations

Wireless Security Primer 101

Military and Emergency operations

Emergency operation Military operation

Infrastructure Network Configurations

Wireless Security Primer 101

Ad hoc Network Constraints

Battery Power/Energy Computational Energy

Consumption Communications Energy

Consumption Re-chargeability Sleep Patterns Transmission Range Memory Time

Group Key Agreement protocols in Ad Hoc Network

Centralized and contributory

Two Types Cliques Group Diffie-Hellman

Protocols Burmester-Desmedt Protocols

All contributory

GDH.2 Protocol

A-GDH.2 Protocol

The basic Burmester-Desmedt Protocols

In the form;

An Authenticated BD Protocol

For added security, the message broadcast is piggybacked with certificate and signature of each node.

Theoretical Analysis

Comm Comp

Round

Msg Uni Broad

Exp

CLQ(GDH

)

Join 4 n+3 n+1 2 n+3Leave,

Partition1 1 0 1 n-1

Merge k+3 n+2k+1

n+2k-1

2 n+2k+1

BD 2 2n 0 2n 3

Group Key Agreement-Theory and Practice - April 10, 2023 Yongdae Kim

Modified for presentation

Protocol comparisonProtocol/Parameter

GDH.2 BD

Scalability High High

Authentication High High

Key independence

High High

Communication energy

High High

Computation energy

High High

Power consumption

High High

Analysis

New changes:1 add first part of protocol2 delete table3 key words4 restructure scenarios5 robust column deleted in table6 BD protocol modified

Questions?