Taxonomy and Research Issues

Slides:



Advertisements
Similar presentations
Overview of CarNet. CarNet Scalable Ad-Hoc wireless network MIT – 849/
Advertisements

Routing protocols in mobile sensor networks -Rajiv Menon.
General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-
1 ◊ Securing Information through Trust Management in Wireless Networks Mohit Virendra, Shambhu Upadhyaya Computer Science and Engineering The State University.
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
Page 1 of Fisheye State Routing (FSR) G. Pei, M. Gerla, Tsu-Wei Chen, "Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks,"
Multicasting in Mobile Ad-Hoc Networks (MANET)
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Wireless Mesh Networks Myungchul Kim
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks Yi Zheng, Uyen Trang Nguyen and Hoang Lan Nguyen Department of Computer.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Review of A new taxonomy of routing algorithms for wireless mobile ad hoc networks: the component approach* Tim Brown *Myung Jong Lee Jianling Zheng Xuhui.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
A Power Control MAC Protocol for Ad Hoc Networks
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Che-Liang Liu, Chih-Yu Wang, Hung-Yu Wei
Zueyong Zhu† and J. William Atwood‡
Group Multicast Capacity in Large Scale Wireless Networks
MOBILE AD-HOC NETWORKS
Energy Efficiency in HEW
Outline Introduction Routing in Mobile Ad Hoc Networks
IPv6 / IP Next Generation
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Wireless Ad Hoc Networks by Analogy to Electrostatic Theory
Mobile ad hoc networking: imperatives and challenges
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
SDN Based IoT-Cloud Comm.
Ekereuke Udoh Distributed and Intelligent Systems Research Group
Thesis Proposal Defense
考慮端對端延遲與流量公平性之無線網狀網路最佳化建置
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
The Impact of Multihop Wireless Channel on TCP Performance
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Amar B. Patel , Shushan Zhao
Title of Your Paper Names of Co-Authors
SCONCE: Secure Computing and Networking Center
AP Functional Needs of CAPWAP
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Power Efficiency Analysis
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Presentation transcript:

Taxonomy and Research Issues Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy Luiz A. DaSilva, and Jean-Jacques Quisquater (Q2SWinet’05) 2006.9.26 Presented by Yu, Yeongjae SALAB at KAIST

Authentication Process Authentication States for a Supplicant Contents Introduction Authentication Process Authentication States for a Supplicant Taxonomy of Authentication Protocols Authentication Management Architecture Conclusion 2 CNLAB at KAIST SALAB at KAIST

1. Introduction Introduction Need for authentication classification To interpret the similarities between sets of related protocols To understand the motivation behind each To better analyze and compare protocols with respect to their encapsulating class rather than individual protocols To identify common vulnerabilities and attacks against each class of authentication protocols To identify common architectural elements in each class 3 Three major criteria for classification A node’s role in the authentication for classification Type of credentials used for authentication Phase during which the establishment of credentials take place SALAB at KAIST

Authentication Process 4 SALAB at KAIST

Authentication States 3. Authentication States for a Supplicant 5 SALAB at KAIST

Taxonomy of Authentication Protocols Classification based on Node role Type of credentials Establishment of credentials 6 SALAB at KAIST

Taxonomy of Authentication Protocols 4-1. Classification based on node role 7 SALAB at KAIST

Taxonomy of Authentication Protocols 4-2. Classification based on type of credentials 8 SALAB at KAIST

Taxonomy of Authentication Protocols 4-3. Classification based on establishment of credentials 9 SALAB at KAIST

Authentication Management Architecture Need for authentication management Enhanced performance Interoperability in today’s networks 10 Factors that affect the performance of the authentication operation A) The network traffic load B) The number of authentication servers C) Servers’ placement SALAB at KAIST

Authentication Management Architecture 5. Authentication Management Architecture (cont’d) Simulation environment 10x10 grid of nodes 20, 40, 60, 80 100, 150, and 200 UDP flows (for A) Before a flow starts, the source and destination nodes should authenticate on another through an authentication server 1,2,3, and 4 authentication servers (for B) Two placement model (for C) 11 SALAB at KAIST

Authentication Management Architecture 5. Authentication Management Architecture (cont’d) Model 2 Model 1 12 SALAB at KAIST

Authentication Management Architecture 5.1 Effect of load 13 SALAB at KAIST

Authentication Management Architecture 5.2 Authentication of flows 14 SALAB at KAIST

Authentication Management Architecture 5.3 Number of servers 15 SALAB at KAIST

Trade off between authentication delay and packet loss Authentication Management Architecture 5.4 Placement of servers 16 Trade off between authentication delay and packet loss SALAB at KAIST

Trade off between authentication delay and packet loss Authentication Management Architecture 5.4 Placement of servers Packet Loss Effect of AS Placement on Packet Loss 17 Trade off between authentication delay and packet loss SALAB at KAIST

Trade off between security and performance Authentication Management Architecture 5.5 Hierarchical deployment model 18 Trade off between security and performance SALAB at KAIST

6. Conclusion Conclusion Summary A generic authentication process A taxonomy of authentication protocols Counterintuitive increase in delay as the number of authentication severs increases for a high number of flows -> highlighting the need for authentication management 19 Discussion Taxonomy in ad hoc network? Meaning of ‘management’ and ‘interoperability’ ? Need for specific simulation explanation How about expending 10X10 topology to broader scale? SALAB at KAIST

Reference * Reference [1] S. Zhu, S. Xu, S. Setia and S. Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks.” In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003 [2] A. Weimerskirch and G. Thonet, “A Distributed Light-Weight Authentication Model for Ad-hoc Networks.” In Proc. of 4th International Conference on Information Security and Cryptology (ICISC 2001), 6-7 December 2001. [3] D. Balfanz, D. K. Smetters, P. Stewart and H. Chi. Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.” In Symposium on Network and Distributed Systems Security (NDSS '02). [4] L. Venkatraman and D. Agrawal, “A Novel Authentication Scheme for Ad Hoc Networks.” In IEEE Wireless Communications and Networking Conference (WCNC2000), vol. 3, pp. 1268--1273, 2000. . 20 SALAB at KAIST