Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black.

Similar presentations


Presentation on theme: "Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black."— Presentation transcript:

1 Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black

2 Reasons for authentication To prevent unwanted users from gaining access to the network o i.e. Only paying members should have access Ensure network integrity o i.e. Only teachers can see grades Protect vital information o i.e. Medical records, Legal records

3 Goals for authentication scheme It should be efficient o memory o financial cost o processor consumption Centralized v.s. Decentralized structure

4 Current Ideas Distributed Authentication Remote Passwords LEAP+ Broadcast Authentication And many more

5 Distributed Authentication Focuses on collectively storing authentication information Uses tokens to store and pass authentication information Designed to reduce cost by moving away from a centralized approach

6 Remote Passwords Uses Secure Remote Password (SRP) protocol with concepts from Simple Authentication for the Web (SAW) It is decentralized

7 LEAP+ Uses four types of keys for each sensor node Computational cost is desirable Storage requirement is efficient

8 Broadcast Authentication Computational and communication cost minimized Four Public Key Cryptography PKC schemes proposed in paper o Certificate-Based o Merkle Hash Tree o Enhanced Merkle Hash Tree o ID-Based

9 Our Contribution Proving the more efficient authentication approach that is available recently. Scrutinize such mechanisms feasibility or investigating it. As of right now we are still gathering information Will be displayed in final presentation

10 References Machiraju, Sridhar, Hao Chen, and Jean Bolot. "Distributed Authentication for Low-Cost Wireless Networks." Proceeding HotMobile '08 Proceedings of the 9th Workshop on Mobile Computing Systems and Applications (2008): 55-59. ACM Digital Library. Web. 20 Mar. 2013. http://delivery.acm.org/10.1145/1420000/1411774/p55- machiraju.pdf?ip=129.252.141.151&acc=ACTIVE%20SERVICE&CFID=296025477&CFTOKEN=40067772&__acm__=1 363816425_f12964a7c52a4b8eda5a1b41848a07b6 Ren, et al., “On Broadcast Authentication in Wireless Sensor Networks” http://www.cnsr.ictas.vt.edu/publication/WASA06-Ren.pdf Zhu, et al., “LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks.” http://www.cse.psu.edu/~szhu/papers/leap.pdf Harding, et al., "Wireless authentication using remote passwords"


Download ppt "Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black."

Similar presentations


Ads by Google