Presentation is loading. Please wait.

Presentation is loading. Please wait.

Taxonomy and Research Issues

Similar presentations


Presentation on theme: "Taxonomy and Research Issues"— Presentation transcript:

1 Taxonomy and Research Issues
Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy Luiz A. DaSilva, and Jean-Jacques Quisquater (Q2SWinet’05) Presented by Yu, Yeongjae SALAB at KAIST

2 Authentication Process Authentication States for a Supplicant
Contents Introduction Authentication Process Authentication States for a Supplicant Taxonomy of Authentication Protocols Authentication Management Architecture Conclusion 2 CNLAB at KAIST SALAB at KAIST

3 1. Introduction Introduction Need for authentication classification
To interpret the similarities between sets of related protocols To understand the motivation behind each To better analyze and compare protocols with respect to their encapsulating class rather than individual protocols To identify common vulnerabilities and attacks against each class of authentication protocols To identify common architectural elements in each class 3 Three major criteria for classification A node’s role in the authentication for classification Type of credentials used for authentication Phase during which the establishment of credentials take place SALAB at KAIST

4 Authentication Process
4 SALAB at KAIST

5 Authentication States
3. Authentication States for a Supplicant 5 SALAB at KAIST

6 Taxonomy of Authentication Protocols
Classification based on Node role Type of credentials Establishment of credentials 6 SALAB at KAIST

7 Taxonomy of Authentication Protocols
4-1. Classification based on node role 7 SALAB at KAIST

8 Taxonomy of Authentication Protocols
4-2. Classification based on type of credentials 8 SALAB at KAIST

9 Taxonomy of Authentication Protocols
4-3. Classification based on establishment of credentials 9 SALAB at KAIST

10 Authentication Management Architecture
Need for authentication management Enhanced performance Interoperability in today’s networks 10 Factors that affect the performance of the authentication operation A) The network traffic load B) The number of authentication servers C) Servers’ placement SALAB at KAIST

11 Authentication Management Architecture
5. Authentication Management Architecture (cont’d) Simulation environment 10x10 grid of nodes 20, 40, 60, , 150, and 200 UDP flows (for A) Before a flow starts, the source and destination nodes should authenticate on another through an authentication server 1,2,3, and 4 authentication servers (for B) Two placement model (for C) 11 SALAB at KAIST

12 Authentication Management Architecture
5. Authentication Management Architecture (cont’d) Model 2 Model 1 12 SALAB at KAIST

13 Authentication Management Architecture
5.1 Effect of load 13 SALAB at KAIST

14 Authentication Management Architecture
5.2 Authentication of flows 14 SALAB at KAIST

15 Authentication Management Architecture
5.3 Number of servers 15 SALAB at KAIST

16 Trade off between authentication delay and packet loss
Authentication Management Architecture 5.4 Placement of servers 16 Trade off between authentication delay and packet loss SALAB at KAIST

17 Trade off between authentication delay and packet loss
Authentication Management Architecture 5.4 Placement of servers Packet Loss Effect of AS Placement on Packet Loss 17 Trade off between authentication delay and packet loss SALAB at KAIST

18 Trade off between security and performance
Authentication Management Architecture 5.5 Hierarchical deployment model 18 Trade off between security and performance SALAB at KAIST

19 6. Conclusion Conclusion Summary A generic authentication process
A taxonomy of authentication protocols Counterintuitive increase in delay as the number of authentication severs increases for a high number of flows -> highlighting the need for authentication management 19 Discussion Taxonomy in ad hoc network? Meaning of ‘management’ and ‘interoperability’ ? Need for specific simulation explanation How about expending 10X10 topology to broader scale? SALAB at KAIST

20 Reference * Reference [1] S. Zhu, S. Xu, S. Setia and S. Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks.” In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003 [2] A. Weimerskirch and G. Thonet, “A Distributed Light-Weight Authentication Model for Ad-hoc Networks.” In Proc. of 4th International Conference on Information Security and Cryptology (ICISC 2001), 6-7 December 2001. [3] D. Balfanz, D. K. Smetters, P. Stewart and H. Chi. Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.” In Symposium on Network and Distributed Systems Security (NDSS '02). [4] L. Venkatraman and D. Agrawal, “A Novel Authentication Scheme for Ad Hoc Networks.” In IEEE Wireless Communications and Networking Conference (WCNC2000), vol. 3, pp , 2000. . 20 SALAB at KAIST


Download ppt "Taxonomy and Research Issues"

Similar presentations


Ads by Google