Download - New Cryptographic Protocols For Wireless Ad Hoc Networks

Transcript
Page 1: New Cryptographic Protocols For Wireless Ad Hoc Networks

Keywords: Computer Networks, cryptography and Network Security, Key Management,

Wireless Ad Hoc Networks.

New cryptographic protocols for

wireless ad hoc networks

Lawrence, Pavan, and Sirija

Page 2: New Cryptographic Protocols For Wireless Ad Hoc Networks

Wireless ad-hoc network A wireless ad-hoc network is a self-

configuring network of mobile nodes ( or hosts).

An arbitrary topology without a fix infrastructure.

Suitable for military and emergency situations:-natural or human-induced disasters, -emergency medical conditions or -military operations

Civilian environment:-classrooms, meeting rooms, sports stadiums

Page 3: New Cryptographic Protocols For Wireless Ad Hoc Networks

Wireless ad-hoc network Topology

From Wikipedia, the free encyclopedia

Page 4: New Cryptographic Protocols For Wireless Ad Hoc Networks

Ad-Hoc Network Configurations

Wireless Security Primer 101

Page 5: New Cryptographic Protocols For Wireless Ad Hoc Networks

Military and Emergency operations

Emergency operation Military operation

Page 6: New Cryptographic Protocols For Wireless Ad Hoc Networks

Infrastructure Network Configurations

Wireless Security Primer 101

Page 7: New Cryptographic Protocols For Wireless Ad Hoc Networks

Ad hoc Network Constraints

Battery Power/Energy Computational Energy

Consumption Communications Energy

Consumption Re-chargeability Sleep Patterns Transmission Range Memory Time

Page 8: New Cryptographic Protocols For Wireless Ad Hoc Networks

Group Key Agreement protocols in Ad Hoc Network

Centralized and contributory

Two Types Cliques Group Diffie-Hellman

Protocols Burmester-Desmedt Protocols

All contributory

Page 9: New Cryptographic Protocols For Wireless Ad Hoc Networks

GDH.2 Protocol

Page 10: New Cryptographic Protocols For Wireless Ad Hoc Networks

A-GDH.2 Protocol

Page 11: New Cryptographic Protocols For Wireless Ad Hoc Networks

The basic Burmester-Desmedt Protocols

In the form;

Page 12: New Cryptographic Protocols For Wireless Ad Hoc Networks

An Authenticated BD Protocol

For added security, the message broadcast is piggybacked with certificate and signature of each node.

Page 13: New Cryptographic Protocols For Wireless Ad Hoc Networks

Theoretical Analysis

Comm Comp

Round

Msg Uni Broad

Exp

CLQ(GDH

)

Join 4 n+3 n+1 2 n+3Leave,

Partition1 1 0 1 n-1

Merge k+3 n+2k+1

n+2k-1

2 n+2k+1

BD 2 2n 0 2n 3

Group Key Agreement-Theory and Practice - April 10, 2023 Yongdae Kim

Modified for presentation

Page 14: New Cryptographic Protocols For Wireless Ad Hoc Networks

Protocol comparisonProtocol/Parameter

GDH.2 BD

Scalability High High

Authentication High High

Key independence

High High

Communication energy

High High

Computation energy

High High

Power consumption

High High

Page 15: New Cryptographic Protocols For Wireless Ad Hoc Networks

Analysis

New changes:1 add first part of protocol2 delete table3 key words4 restructure scenarios5 robust column deleted in table6 BD protocol modified

Page 16: New Cryptographic Protocols For Wireless Ad Hoc Networks

Questions?