New Cryptographic Protocols For Wireless Ad Hoc Networks
-
Upload
lawuah -
Category
Technology
-
view
1.032 -
download
1
description
Transcript of New Cryptographic Protocols For Wireless Ad Hoc Networks
Keywords: Computer Networks, cryptography and Network Security, Key Management,
Wireless Ad Hoc Networks.
New cryptographic protocols for
wireless ad hoc networks
Lawrence, Pavan, and Sirija
Wireless ad-hoc network A wireless ad-hoc network is a self-
configuring network of mobile nodes ( or hosts).
An arbitrary topology without a fix infrastructure.
Suitable for military and emergency situations:-natural or human-induced disasters, -emergency medical conditions or -military operations
Civilian environment:-classrooms, meeting rooms, sports stadiums
Wireless ad-hoc network Topology
From Wikipedia, the free encyclopedia
Ad-Hoc Network Configurations
Wireless Security Primer 101
Military and Emergency operations
Emergency operation Military operation
Infrastructure Network Configurations
Wireless Security Primer 101
Ad hoc Network Constraints
Battery Power/Energy Computational Energy
Consumption Communications Energy
Consumption Re-chargeability Sleep Patterns Transmission Range Memory Time
Group Key Agreement protocols in Ad Hoc Network
Centralized and contributory
Two Types Cliques Group Diffie-Hellman
Protocols Burmester-Desmedt Protocols
All contributory
GDH.2 Protocol
A-GDH.2 Protocol
The basic Burmester-Desmedt Protocols
In the form;
An Authenticated BD Protocol
For added security, the message broadcast is piggybacked with certificate and signature of each node.
Theoretical Analysis
Comm Comp
Round
Msg Uni Broad
Exp
CLQ(GDH
)
Join 4 n+3 n+1 2 n+3Leave,
Partition1 1 0 1 n-1
Merge k+3 n+2k+1
n+2k-1
2 n+2k+1
BD 2 2n 0 2n 3
Group Key Agreement-Theory and Practice - April 10, 2023 Yongdae Kim
Modified for presentation
Protocol comparisonProtocol/Parameter
GDH.2 BD
Scalability High High
Authentication High High
Key independence
High High
Communication energy
High High
Computation energy
High High
Power consumption
High High
Analysis
New changes:1 add first part of protocol2 delete table3 key words4 restructure scenarios5 robust column deleted in table6 BD protocol modified
Questions?