October 21th, 2009 HGP Team Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet CS642 - Distributed Systems.

Slides:



Advertisements
Similar presentations
Fast and Secure Universal Roaming Service for Mobile Internet Yeali S. Sun, Yu-Chun Pan, Meng-Chang Chen.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Wireless Sensor Network Security Anuj Nagar CS 590.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
1 Outline General Description Breakthroughs and Major Achievements Categorized Summary A Summary of the Post-Project Plan International Cooperation Activities.
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
1 Status Report on CJK NGN Working Group China Communications Standards Association 9 th CJK meeting April 2009 HeyuanXu, Chairman of NGN-WG.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
Security in Wireless Sensor Networks by Toni Farley.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
An Adaptive Protocol for Efficient & Secure Multicasting in Wireless LANS Sandeep Gupta & Sriram Cherukuri Arizona State University
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Secured key exchange protocol in wireless mobile ad hoc networks ► Shu-Hwang Liaw; Pin-Chang Su; Henry Ker-Chang Chang; Erl-Huei Lu; Shun-Fu Pon; ► CCST.
Wireless Network Security CSIS 5857: Encoding and Encryption.
ACT: Audio Conference Tool Over Named Data Networking Zhenkai Zhu, Sen Wang, Xu Yang, Van Jacobson, Lixia Zhang ICN ‘11 August 19 Presenter: Junghwan Song.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Network Security in Ring Multicast Diffie - Hellman Algorithm 1.A and B agree on a prime q and a number 1
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
Golden Linear Group Key Agreement Protocol
Zueyong Zhu† and J. William Atwood‡
A three round authenticated group key agreement protocol for ad hoc networks Authors: Daniel Augot, Raghav Bhaskar, Valérie Issarny, and Daniele Sacchetti.
Amar B. Patel , Shushan Zhao
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Secure Diffie-Hellman Algorithm
Presentation transcript:

October 21th, 2009 HGP Team Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet CS642 - Distributed Systems

1. Proposal review 1. Design specifications 1. Next Plan

Park, Ricciardi, Alauzet CS642 - Session key management in a spontaneous network 3 / 11 October 21th, 2009  We are interest in the case of:  Two private spontaneous networks decide to merge together  We wish to find an efficient way for merging multiple private networks in terms of number of messages and size of the message. 1. Proposal review2. Design specifications3. Next plan

Park, Ricciardi, Alauzet CS642 - Session key management in a spontaneous network 4 / 11 October 21th, 2009  In the private networks they are using common session keys for secure communication,  When merging network(s) it needs to manage session keys. Creating a new session key or choosing one of them for the merged network. Share the new session key to all members.  Related works  GKA(Group Key Agreement)-key paper A mechanism to create a common session key for a group of users. Each member provide a public contribution for creating a common session key. It can share a common session key without the use of a secure channel.  Problem  Require creation of a new session key at every times when the network members are changed(join, leave, merge, separating)  Requires 2n messages exchanges for creation and distribution of a new session key.  Each message for exchange a session key is in size of encrypting SizeOfSessionKey*2*n  Ex) if the key size is 256bit, and size of node is 100=> 256*100*2 = bit = 6.4kbytes. 1. Proposal review2. Design specifications3. Next plan

Park, Ricciardi, Alauzet CS642 - Session key management in a spontaneous network 5 / 11 October 21th, 2009  Related works(cont.) 1. Proposal review2. Design specifications3. Next plan Protocol # of messages for creating and sharing a common session key. Size of a message GKAO(N)2*N*sizeOfSessionKey Dynamic Group Diffie- Hellman Key Exchange O(N ^2 )sizeOfSessionKey Scalable Protocols for authenticated Group Key exchange O(N)… Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups O(LogN*(N))… Our Idea O(N) for leave, merging O(1) for join Join, Merge: sizeOfSessionKey Leave: N*sizeOfSessionKey

Park, Ricciardi, Alauzet CS642 - Session key management in a spontaneous network 6 / 11 October 21th, 2009  Elect a leader for creating and distributing a new session key.  Use of a session key independent of members’ context  It doesn’t need to create a new session key when a node request to join.  It allows choosing one among two existing session keys for a new session key when merging two networks. 1. Proposal review2. Design specifications3. Next plan

October 21th, 2009 HGP Team Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet CS642 - Distributed Systems Thank you for your attention ! Any question ? Thank you for your attention ! Any question ?

1. “Establishing trust in pure ad-hoc networks”, Asad Amir Pirzada, Chris McDonald January 2004 ACSC '04: Proceedings of the 27th Australasian conference on Computer science - Volume 26, Volume 26 (ACM Portal) 2. “Spontaneous networks: Trust in a world of equals”, Gilaberte, R.L.; Herrero, L.P.; Networking and Services, ICNS '06. International conference on July 2006 Page(s): (IEEE Xplore) 3. “Security management for ad-hoc networked resource-limited mobile devices” Sedov, I.; Speicher, S.; Cap, C.; Vehicular Technology Conference, VTC2004-Fall IEEE 60th Volume 5, Sept Page(s): Vol. 5 (IEEE Xplore) 4. “Implicit merging of overlapping spontaneous networks [mobile ad hoc networks]”, Legendre, F.; de Amorim, M.D.; Fdida, S.; Vehicular Technology Conference, VTC2004-Fall IEEE 60th Volume 4, Sept Page(s): Vol. 4 (IEEE Xplore) 5. "Spontnet: experiences in configuring and securing small ad hoc networks”, Feeney, L.M.; Ahlgren, B.; Westerlund, A.; Dunkels, A.; Networked Appliances, “A survey on peer-to-peer key management for mobile ad hoc networks.“, van der Merwe, J., Dawoud, D., and McDonald, S ACM Comput. Surv. 39, 1, Article 1 (April 2007)

1. “An Efficient Session Key Generation Protocol”, Chin-Chen Chang, Chi-Yien Chung, Proceedings of ICCTZOO3 2. “An Efficient Group Key Agreement Protocol for Ad hoc Networks” Daniel Augot, Raghav Bhaskar, Val ? rie Issarny and Daniele Sacchetti Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume “Self-organised Group Key Management for Ad Hoc Networks”, Ling Luo, Rei Safavi-Naini, Joonsang Baek and Willy Susilo, ASIAN ACM Symposium on Information, Computer and Communications Security archive Proceedings of the 2006 ACM Symposium on Information, computer and communications security Taipei, Taiwan