DOC PREVIEW
MASON ECE 646 - Comparing Cryptographic protocols for securing wireless Ad-hoc Networks

This preview shows page 1-2-14-15-30-31 out of 31 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Comparing Cryptographic protocols for securing wireless Ad-hoc NetworksAdvisor : Prof.Kris Gaj.Wireless ad-hoc networkWireless ad-hoc network TopologyAd-Hoc Network ConfigurationsMilitary and Emergency operationsInfrastructure Network ConfigurationsConstraints in Ad-hoc NetworksSome Groups of Protocols used for Communication in Ad_hoc networksGroup Key Agreement protocols in Ad Hoc NetworkGDH.2 ProtocolCliques Group Diffie-Hellman ProtocolsBurmester-Desmedt ProtocolsAn Authenticated BD Protocol Theoretical AnalysisProtocol comparisonArbitrated ProtocolKerberos ProtocolKerberosOtwayrees ProtocolOtwayreesProtocol ComparisonPre deployed keying protocolNetwork wide pre deployed protocolNode specific pre deployed protocolKey Distribution Pattern based Pre deployed ProtocolConstruction of KDPBlom’s Key Distribution SchemeProtocol ComparisonProtocol Vs Security parametersPurpose Vs ProtocolComparing Cryptographic protocols for Comparing Cryptographic protocols for securing wireless Adsecuring wireless Ad--hoc Networkshoc NetworksAdvisor : Prof.Kris Gaj. Advisor : Prof.Kris Gaj. Project TeamLawrence,Pavan,Sirija.Wireless adWireless ad--hoc networkhoc networkA wireless adA wireless ad--hoc network is a selfhoc network is a self--configuring configuring network of mobile nodes ( or hosts).network of mobile nodes ( or hosts).An arbitrary topology without a fix infrastructure.An arbitrary topology without a fix infrastructure.Suitable for military and emergency situations:Suitable for military and emergency situations:--natural or humannatural or human--induced disasters, induced disasters, --emergency medical conditions or emergency medical conditions or --military operationsmilitary operationsCivilian environment:Civilian environment:--classrooms, meeting rooms, sports stadiumsclassrooms, meeting rooms, sports stadiumsWireless adWireless ad--hoc network Topologyhoc network TopologyFrom Wikipedia, the free encyclopediaFrom Wikipedia, the free encyclopediaAdAd--Hoc Network ConfigurationsHoc Network ConfigurationsWireless Security Primer 101Military and Emergency operationsMilitary and Emergency operationsMilitary operationEmergency operationInfrastructure Network ConfigurationsInfrastructure Network ConfigurationsWireless Security Primer 101Constraints in AdConstraints in Ad--hoc Networkshoc NetworksAuthentication.Authentication.Session secrecy.Session secrecy.¾¾Forward Secrecy. Forward Secrecy. ¾¾Backward Secrecy.Backward Secrecy.Power Consumption. Power Consumption. Memory ConsumptionMemory Consumption..Scalability.Scalability.Some Groups of Protocols used for Some Groups of Protocols used for Communication in Ad_hoc networksCommunication in Ad_hoc networksGroup keying ProtocolsGroup keying ProtocolsDiffieDiffie--Hellman ProtocolsHellman ProtocolsBurmesterBurmester--Desmedt ProtocolsDesmedt ProtocolsArbitrated ProtocolsArbitrated ProtocolsKerberos ProtocolsKerberos ProtocolsOtwayOtway--ReesReesPrePre--Deployed Keying ProtocolsDeployed Keying ProtocolsNetworkNetwork--wide prewide pre--deployed keying protocol.deployed keying protocol.NodeNode--specific prespecific pre--deployed keying protocol.deployed keying protocol.KDP based Pre deployed keying Protocol.KDP based Pre deployed keying Protocol.Group Key Agreement protocols inGroup Key Agreement protocols inAd Hoc NetworkAd Hoc NetworkCentralized and contributoryCentralized and contributoryTwo TypesTwo TypesCliques Group DiffieCliques Group Diffie--Hellman Protocols Hellman Protocols BurmesterBurmester--Desmedt ProtocolsDesmedt ProtocolsAll contributoryAll contributoryGDH.2 ProtocolGDH.2 ProtocolCliquesCliquesGroup DiffieGroup Diffie--Hellman Hellman ProtocolsProtocolsBurmesterBurmester--Desmedt ProtocolsDesmedt ProtocolsIn the form;An Authenticated BD Protocol For added security, the message broadcast is piggybacked with certificate and signature of each node.TheoreticalTheoreticalAnalysisAnalysisCommCommCompCompRoundRoundMsgMsgUniUniBroadBroadExpExpJoinJoin44n+3n+3n+1n+122n+3n+3Leave, Leave, PartitionPartition11110011nn--11MergeMergek+3k+3n+2k+n+2k+11n+2kn+2k--1122n+2k+1n+2k+1BDBD222n2n002n2n3 3 CLQCLQ(GDH)(GDH)Group Key AgreementGroup Key Agreement--Theory and Practice Theory and Practice --February 13, 2006February 13, 2006Yongdae KimYongdae KimModified for presentationModified for presentationProtocolProtocolcomparisoncomparisonProtocol/ParameterProtocol/ParameterGDH.2GDH.2BDBDGeneralGeneralAuthenticationAuthenticationHigh High High High High High Forward SecrecyForward SecrecyHighHighHighHighHighHighBackward SecrecyBackward SecrecyHighHighHighHighHighHighMemory ConsumptionMemory ConsumptionHigh High HighHighHighHighPower Consumed Power Consumed High High High High High High ScalabilityScalabilityHighHighHigh High High HighArbitratedArbitratedProtocolProtocolExamples of Arbitrated ProtocolsExamples of Arbitrated ProtocolsKerberos ProtocolKerberos ProtocolOtwayrees ProtocolOtwayrees ProtocolNodeANodeBKDCKerberosKerberosProtocolProtocol¾¾Based on the KerberosV5 Protocol and is Based on the KerberosV5 Protocol and is modified to address the limitations of the Adhoc modified to address the limitations of the Adhoc Networks.Networks.¾¾All the communicating nodes share a Secret All the communicating nodes share a Secret key with trusted third party called Key key with trusted third party called Key Distribution Center Distribution Center ““KDCKDC””..¾¾key is distributed prior to the deployment.key is distributed prior to the deployment.KerberosKerberosRoundsRounds1.1.KDC||IDKDC||IDAA||ID||IDBB||NA||NA2.2.IDIDAA||KDC|| ||KDC|| TicketB||NA TicketB is TicketB||NA TicketB is KKB,KDCB,KDC(Kpair|| ID(Kpair|| IDAA||L) ||L) 3.3.IDIDBB|| ID|| IDAA||TicketB|| E ||TicketB|| E KpairKpair(ID(IDBB,TA),TA)4.4.IDIDAA|| ID|| IDBB|| E || E KpairKpair(TA)Node ANode BKDCRound1Round2Round3Round4(TA)OtwayreesOtwayreesProtocolProtocolBased on Needham Schroeder protocol.Based on Needham Schroeder protocol.Different from Kerberos as it uses Nonce instead Different from Kerberos as it uses Nonce instead of time stamps to provide better security.of time stamps to provide better security.OtwayreesOtwayreesNode A Node BKDCRoundsRounds1.1.IDB||IDA||KDCj||NA


View Full Document

MASON ECE 646 - Comparing Cryptographic protocols for securing wireless Ad-hoc Networks

Documents in this Course
Load more
Download Comparing Cryptographic protocols for securing wireless Ad-hoc Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Comparing Cryptographic protocols for securing wireless Ad-hoc Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Comparing Cryptographic protocols for securing wireless Ad-hoc Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?