New Cryptographic Protocols For Wireless Ad Hoc Networks

16
Keywords: Computer Networks, cryptography and Network Security, Key Management, Wireless Ad Hoc Networks. New cryptographic protocols for wireless ad hoc networks Lawrence, Pavan, and Sirija

description

Presentation on new cryptographic protocols for wireless Ad-hoc networks

Transcript of New Cryptographic Protocols For Wireless Ad Hoc Networks

Page 1: New Cryptographic Protocols For Wireless Ad Hoc Networks

Keywords: Computer Networks, cryptography and Network Security, Key Management,

Wireless Ad Hoc Networks.

New cryptographic protocols for

wireless ad hoc networks

Lawrence, Pavan, and Sirija

Page 2: New Cryptographic Protocols For Wireless Ad Hoc Networks

Wireless ad-hoc network A wireless ad-hoc network is a self-

configuring network of mobile nodes ( or hosts).

An arbitrary topology without a fix infrastructure.

Suitable for military and emergency situations:-natural or human-induced disasters, -emergency medical conditions or -military operations

Civilian environment:-classrooms, meeting rooms, sports stadiums

Page 3: New Cryptographic Protocols For Wireless Ad Hoc Networks

Wireless ad-hoc network Topology

From Wikipedia, the free encyclopedia

Page 4: New Cryptographic Protocols For Wireless Ad Hoc Networks

Ad-Hoc Network Configurations

Wireless Security Primer 101

Page 5: New Cryptographic Protocols For Wireless Ad Hoc Networks

Military and Emergency operations

Emergency operation Military operation

Page 6: New Cryptographic Protocols For Wireless Ad Hoc Networks

Infrastructure Network Configurations

Wireless Security Primer 101

Page 7: New Cryptographic Protocols For Wireless Ad Hoc Networks

Ad hoc Network Constraints

Battery Power/Energy Computational Energy

Consumption Communications Energy

Consumption Re-chargeability Sleep Patterns Transmission Range Memory Time

Page 8: New Cryptographic Protocols For Wireless Ad Hoc Networks

Group Key Agreement protocols in Ad Hoc Network

Centralized and contributory

Two Types Cliques Group Diffie-Hellman

Protocols Burmester-Desmedt Protocols

All contributory

Page 9: New Cryptographic Protocols For Wireless Ad Hoc Networks

GDH.2 Protocol

Page 10: New Cryptographic Protocols For Wireless Ad Hoc Networks

A-GDH.2 Protocol

Page 11: New Cryptographic Protocols For Wireless Ad Hoc Networks

The basic Burmester-Desmedt Protocols

In the form;

Page 12: New Cryptographic Protocols For Wireless Ad Hoc Networks

An Authenticated BD Protocol

For added security, the message broadcast is piggybacked with certificate and signature of each node.

Page 13: New Cryptographic Protocols For Wireless Ad Hoc Networks

Theoretical Analysis

Comm Comp

Round

Msg Uni Broad

Exp

CLQ(GDH

)

Join 4 n+3 n+1 2 n+3Leave,

Partition1 1 0 1 n-1

Merge k+3 n+2k+1

n+2k-1

2 n+2k+1

BD 2 2n 0 2n 3

Group Key Agreement-Theory and Practice - April 10, 2023 Yongdae Kim

Modified for presentation

Page 14: New Cryptographic Protocols For Wireless Ad Hoc Networks

Protocol comparisonProtocol/Parameter

GDH.2 BD

Scalability High High

Authentication High High

Key independence

High High

Communication energy

High High

Computation energy

High High

Power consumption

High High

Page 15: New Cryptographic Protocols For Wireless Ad Hoc Networks

Analysis

New changes:1 add first part of protocol2 delete table3 key words4 restructure scenarios5 robust column deleted in table6 BD protocol modified

Page 16: New Cryptographic Protocols For Wireless Ad Hoc Networks

Questions?