Comparing Cryptographic protocols for securing wireless Ad-hoc NetworksAdvisor : Prof.Kris Gaj.Wireless ad-hoc networkWireless ad-hoc network TopologyAd-Hoc Network ConfigurationsMilitary and Emergency operationsInfrastructure Network ConfigurationsConstraints in Ad-hoc NetworksSome Groups of Protocols used for Communication in Ad_hoc networksGroup Key Agreement protocols in Ad Hoc NetworkGDH.2 ProtocolCliques Group Diffie-Hellman ProtocolsBurmester-Desmedt ProtocolsAn Authenticated BD Protocol Theoretical AnalysisProtocol comparisonArbitrated ProtocolKerberos ProtocolKerberosOtwayrees ProtocolOtwayreesProtocol ComparisonPre deployed keying protocolNetwork wide pre deployed protocolNode specific pre deployed protocolKey Distribution Pattern based Pre deployed ProtocolConstruction of KDPBlom’s Key Distribution SchemeProtocol ComparisonProtocol Vs Security parametersPurpose Vs ProtocolComparing Cryptographic protocols for Comparing Cryptographic protocols for securing wireless Adsecuring wireless Ad--hoc Networkshoc NetworksAdvisor : Prof.Kris Gaj. Advisor : Prof.Kris Gaj. Project TeamLawrence,Pavan,Sirija.Wireless adWireless ad--hoc networkhoc networkA wireless adA wireless ad--hoc network is a selfhoc network is a self--configuring configuring network of mobile nodes ( or hosts).network of mobile nodes ( or hosts).An arbitrary topology without a fix infrastructure.An arbitrary topology without a fix infrastructure.Suitable for military and emergency situations:Suitable for military and emergency situations:--natural or humannatural or human--induced disasters, induced disasters, --emergency medical conditions or emergency medical conditions or --military operationsmilitary operationsCivilian environment:Civilian environment:--classrooms, meeting rooms, sports stadiumsclassrooms, meeting rooms, sports stadiumsWireless adWireless ad--hoc network Topologyhoc network TopologyFrom Wikipedia, the free encyclopediaFrom Wikipedia, the free encyclopediaAdAd--Hoc Network ConfigurationsHoc Network ConfigurationsWireless Security Primer 101Military and Emergency operationsMilitary and Emergency operationsMilitary operationEmergency operationInfrastructure Network ConfigurationsInfrastructure Network ConfigurationsWireless Security Primer 101Constraints in AdConstraints in Ad--hoc Networkshoc NetworksAuthentication.Authentication.Session secrecy.Session secrecy.¾¾Forward Secrecy. Forward Secrecy. ¾¾Backward Secrecy.Backward Secrecy.Power Consumption. Power Consumption. Memory ConsumptionMemory Consumption..Scalability.Scalability.Some Groups of Protocols used for Some Groups of Protocols used for Communication in Ad_hoc networksCommunication in Ad_hoc networksGroup keying ProtocolsGroup keying ProtocolsDiffieDiffie--Hellman ProtocolsHellman ProtocolsBurmesterBurmester--Desmedt ProtocolsDesmedt ProtocolsArbitrated ProtocolsArbitrated ProtocolsKerberos ProtocolsKerberos ProtocolsOtwayOtway--ReesReesPrePre--Deployed Keying ProtocolsDeployed Keying ProtocolsNetworkNetwork--wide prewide pre--deployed keying protocol.deployed keying protocol.NodeNode--specific prespecific pre--deployed keying protocol.deployed keying protocol.KDP based Pre deployed keying Protocol.KDP based Pre deployed keying Protocol.Group Key Agreement protocols inGroup Key Agreement protocols inAd Hoc NetworkAd Hoc NetworkCentralized and contributoryCentralized and contributoryTwo TypesTwo TypesCliques Group DiffieCliques Group Diffie--Hellman Protocols Hellman Protocols BurmesterBurmester--Desmedt ProtocolsDesmedt ProtocolsAll contributoryAll contributoryGDH.2 ProtocolGDH.2 ProtocolCliquesCliquesGroup DiffieGroup Diffie--Hellman Hellman ProtocolsProtocolsBurmesterBurmester--Desmedt ProtocolsDesmedt ProtocolsIn the form;An Authenticated BD Protocol For added security, the message broadcast is piggybacked with certificate and signature of each node.TheoreticalTheoreticalAnalysisAnalysisCommCommCompCompRoundRoundMsgMsgUniUniBroadBroadExpExpJoinJoin44n+3n+3n+1n+122n+3n+3Leave, Leave, PartitionPartition11110011nn--11MergeMergek+3k+3n+2k+n+2k+11n+2kn+2k--1122n+2k+1n+2k+1BDBD222n2n002n2n3 3 CLQCLQ(GDH)(GDH)Group Key AgreementGroup Key Agreement--Theory and Practice Theory and Practice --February 13, 2006February 13, 2006Yongdae KimYongdae KimModified for presentationModified for presentationProtocolProtocolcomparisoncomparisonProtocol/ParameterProtocol/ParameterGDH.2GDH.2BDBDGeneralGeneralAuthenticationAuthenticationHigh High High High High High Forward SecrecyForward SecrecyHighHighHighHighHighHighBackward SecrecyBackward SecrecyHighHighHighHighHighHighMemory ConsumptionMemory ConsumptionHigh High HighHighHighHighPower Consumed Power Consumed High High High High High High ScalabilityScalabilityHighHighHigh High High HighArbitratedArbitratedProtocolProtocolExamples of Arbitrated ProtocolsExamples of Arbitrated ProtocolsKerberos ProtocolKerberos ProtocolOtwayrees ProtocolOtwayrees ProtocolNodeANodeBKDCKerberosKerberosProtocolProtocol¾¾Based on the KerberosV5 Protocol and is Based on the KerberosV5 Protocol and is modified to address the limitations of the Adhoc modified to address the limitations of the Adhoc Networks.Networks.¾¾All the communicating nodes share a Secret All the communicating nodes share a Secret key with trusted third party called Key key with trusted third party called Key Distribution Center Distribution Center ““KDCKDC””..¾¾key is distributed prior to the deployment.key is distributed prior to the deployment.KerberosKerberosRoundsRounds1.1.KDC||IDKDC||IDAA||ID||IDBB||NA||NA2.2.IDIDAA||KDC|| ||KDC|| TicketB||NA TicketB is TicketB||NA TicketB is KKB,KDCB,KDC(Kpair|| ID(Kpair|| IDAA||L) ||L) 3.3.IDIDBB|| ID|| IDAA||TicketB|| E ||TicketB|| E KpairKpair(ID(IDBB,TA),TA)4.4.IDIDAA|| ID|| IDBB|| E || E KpairKpair(TA)Node ANode BKDCRound1Round2Round3Round4(TA)OtwayreesOtwayreesProtocolProtocolBased on Needham Schroeder protocol.Based on Needham Schroeder protocol.Different from Kerberos as it uses Nonce instead Different from Kerberos as it uses Nonce instead of time stamps to provide better security.of time stamps to provide better security.OtwayreesOtwayreesNode A Node BKDCRoundsRounds1.1.IDB||IDA||KDCj||NA
View Full Document