KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 2015-10-04 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
SUBJECTIVE LOGIC BASED PROBABILISTIC KEY MANAGEMENT FOR MANETS Mahdieh Ahmadi Performance and Dependability Laboratory Sharif University of Technology.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Computationally Secure Hierarchical Self- Healing Group Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F. Bao Presenter: Jianying Zhou.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Author: Hangyang Dai and Hongbing Xu
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Distributed Trust Relationship & Polynomial-based Key Generation for IEEE m Networks IEEE Presentation Submission Template (Rev. 9) Document.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Security of the Internet of Things: perspectives and challenges
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Presented by Edith Ngai MPhil Term 3 Presentation
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
MinJi Kim, Muriel Médard, João Barros
Fisheye Routing protocol
Presentation transcript:

KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin Xie and Dharma P. Agrawal University of Cincinnati Journal of Parallel and Distributed Computing 2007

Contents Introduction Background Decentralized key generation schema Security and Performance Analysis Conclusion 2 / 14

Introduction (1/4) Traditional MANET(Mobile Ad hoc NETwork) Purely consist of mobile nodes Absence of the centralized authority Many problems with secure key generation Because no prior trust relationships Solution is pre-distribution of secure key 3 / 14

Introduction (2/4) Cellular-based MANET in reality The cellular mobile has more than one cellular medium Bluetooth, Wi-Fi, Infrared, etc  medium of MANET 4 / 14 Cellular infra Bluetooth Wi-Fi Infrared

Introduction (3/4) Necessity of MANET in reality Direct communication between mobiles is cheaper Cheaper than communication through Cellular infrastructure Take advantages of cellular infrastructure to MANET Utilizing a cellular network for key management 5 / 14 Authentication from Cellular-infra How to get security? Authentication from Cellular-infra

Introduction (4/4) In this paper Propose “Decentralized key generation scheme” for MANET Multiple BS(Base Station) Minimize intervention Scalability of key generation and distribution 6 / 14

Polynomial key scheme Two variable for one symmetric calculation Background 7 / Input x 2. Exchange identifier 1. Input x 3. Input y 4. Same value (secret key) Symmetric Property

Decentralized key generation schema (1/5) Extended form of polynomial key Four variable for two symmetric calculation 8 / 14 Mobile peer Base Station peer

Decentralized key generation schema (2/5) Cellular infrastructure for key management 9 / 14

Decentralized key generation schema (3/5) Group-based polynomial Polynomial exchange between Base Stations 10 / 14

Decentralized key generation schema (4/5) Polynomial for MS Distributing polynomials to Mobiles 11 / 14

Decentralized key generation schema (5/5) Pairwise direct message exchange between Mobiles 12 / 14 EntityID Base Stationi Mobilea EntityID Base Stationj Mobileb

Security analysis (1/2) Hazard of K-degree polynomial key Compromise entire secret key by compromising ≥ K nodes Hazard of the polynomial key in this paper 13 / 14 Possible to calculate original function Compromise more than K nodes Once compromise entire network Entity typeCompromise conditionCompromised Base Station≥ K Mobile≥ K 2 Mobile≥ K a BS, b MSaK+b ≥ K 2

Security analysis (2/2) Security comparison (Yi Cheng et al.) Bulletproof at sensor node capture attack (while <K) 14 / 14 Polynomial scheme

Performance analysis (1/3) Routing overhead in key exchange 15 / 14

Performance analysis (2/3) Average latency during the initial key exchange 16 / 14

Performance analysis (3/3) Key storage overhead comparison (Yi Cheng et al.) Constant and low storage overhead with whatever size 17 / 14 Polynomial scheme

Conclusion Propose a novel method for cellular-based MANET MS can enjoy the same trust in MANET Trust in MS is derived from backbone cellular network Easy key distribution by polynomial key scheme Function key distribution and exchanging identifier 18 / 14