New Cryptographic Protocols For Wireless Ad Hoc Networks
-
Upload
lawuah -
Category
Technology
-
view
1.032 -
download
1
description
Transcript of New Cryptographic Protocols For Wireless Ad Hoc Networks
![Page 1: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/1.jpg)
Keywords: Computer Networks, cryptography and Network Security, Key Management,
Wireless Ad Hoc Networks.
New cryptographic protocols for
wireless ad hoc networks
Lawrence, Pavan, and Sirija
![Page 2: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/2.jpg)
Wireless ad-hoc network A wireless ad-hoc network is a self-
configuring network of mobile nodes ( or hosts).
An arbitrary topology without a fix infrastructure.
Suitable for military and emergency situations:-natural or human-induced disasters, -emergency medical conditions or -military operations
Civilian environment:-classrooms, meeting rooms, sports stadiums
![Page 3: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/3.jpg)
Wireless ad-hoc network Topology
From Wikipedia, the free encyclopedia
![Page 4: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/4.jpg)
Ad-Hoc Network Configurations
Wireless Security Primer 101
![Page 5: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/5.jpg)
Military and Emergency operations
Emergency operation Military operation
![Page 6: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/6.jpg)
Infrastructure Network Configurations
Wireless Security Primer 101
![Page 7: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/7.jpg)
Ad hoc Network Constraints
Battery Power/Energy Computational Energy
Consumption Communications Energy
Consumption Re-chargeability Sleep Patterns Transmission Range Memory Time
![Page 8: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/8.jpg)
Group Key Agreement protocols in Ad Hoc Network
Centralized and contributory
Two Types Cliques Group Diffie-Hellman
Protocols Burmester-Desmedt Protocols
All contributory
![Page 9: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/9.jpg)
GDH.2 Protocol
![Page 10: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/10.jpg)
A-GDH.2 Protocol
![Page 11: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/11.jpg)
The basic Burmester-Desmedt Protocols
In the form;
![Page 12: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/12.jpg)
An Authenticated BD Protocol
For added security, the message broadcast is piggybacked with certificate and signature of each node.
![Page 13: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/13.jpg)
Theoretical Analysis
Comm Comp
Round
Msg Uni Broad
Exp
CLQ(GDH
)
Join 4 n+3 n+1 2 n+3Leave,
Partition1 1 0 1 n-1
Merge k+3 n+2k+1
n+2k-1
2 n+2k+1
BD 2 2n 0 2n 3
Group Key Agreement-Theory and Practice - April 10, 2023 Yongdae Kim
Modified for presentation
![Page 14: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/14.jpg)
Protocol comparisonProtocol/Parameter
GDH.2 BD
Scalability High High
Authentication High High
Key independence
High High
Communication energy
High High
Computation energy
High High
Power consumption
High High
![Page 15: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/15.jpg)
Analysis
New changes:1 add first part of protocol2 delete table3 key words4 restructure scenarios5 robust column deleted in table6 BD protocol modified
![Page 16: New Cryptographic Protocols For Wireless Ad Hoc Networks](https://reader036.fdocuments.in/reader036/viewer/2022082916/54987beeac7959092e8b568d/html5/thumbnails/16.jpg)
Questions?