Download presentation
Presentation is loading. Please wait.
Published byLogan Washington Modified over 9 years ago
1
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks Authors: R. Lu, Z. Cao, L. Wang, and C. Sun Sources: Computer Standards & Interfaces, article in press. Reporter: Chun-Ta Li ( 李俊達 )
2
22 Outline Motivation SARPAKE (Secure Anonymous Routing Protocol with Authenticated Key Exchange) protocol Comments
3
3 Motivation Reactive routing (source-initiated on-demand driven) in privacy-vital environment Anonymity Authenticated key exchange into the routing algorithm
4
4 SARPAKE protocol Notations
5
5 SARPAKE protocol (cont.) Assumptions
6
6 SARPAKE protocol (cont.) Path discovery phase
7
7 SARPAKE protocol (cont.) Path reverse phase
8
8 SARPAKE protocol (cont.) Data transfer phase
9
9 Comments Security weakness in data transfer phase (non- repudiation is not achieved) (replay attack) Node SNode DNode 1Node 2 [C||CH] [C’||CH’] C = [M] SK, h=H(C) CH = E PK1 (tag#, h) C = [M] SK, h=H(C) CH = E PK2 (tag#, h) Intruder C’ = [M’] SK’, h’=H(C’) CH’ = E PKD (tag#, h’) // No one can accuse that Node 2 is guilty because all of nodes are capable of forging this fake messages //
10
10 Comments Even assumption 4 is used, anonymity might not be achieved (Assume that attacker can collect all the communication messages over ad hoc networks and tag# is public)
11
Comments Improvement (path discovery phase) 11 || Nonce 0n (tag#, N n, Nonce 0n, ?, null, T 0 ) LRT 0 (tag#, N n-1, null, ?, null, T i ) LRT i (tag#, N n-2, null, ?, null, T n-1 ) LRT n-1 (tag#, N n-1, null, N 0, Nonce 0n, T n ) LRT n // Assume that the involved nodes for a specific route are trusted //
12
12 Comments Improvement (path reverse phase) (tag#, N 2, Nonce 2D, N S, Nonce SD, T D ) LRT D Node SNode DNode 1Node 2 C 2 = E PK2 (tag#, Nonce 2 ) C D = E PKS (M||Nonce SD +1) [C D ||C 2 ] (tag#, N 1, Nonce 12, N D, Nonce 2D, T 2 ) LRT 2 C 1 = E PK1 (tag#, Nonce 1 ) C D = E PKS (M ||Nonce SD +1) [C D ||C 1 ] (tag#, N S, Nonce S1, N 2, Nonce 12, T 1 ) LRT 1 C S = E PKS (tag#, Nonce S ) C D = E PKS (M ||Nonce SD +1) [C D ||C S ] (tag#, 0, Nonce SD, N 1, Nonce S1, T S ) LRT S M = D SKS (C D )
13
13 Comments Improvement (data transfer phase) Node SNode DNode 1Node 2 C = [M||Nonce SD +2] SK, h=H(C||Nonce S1 +1) CH = E PK1 (tag#, h) [C||CH] C = [M] SK, h=H(C||Nonce 12 +1) CH = E PK2 (tag#, h) [C||CH] C = [M] SK, h=H(C||Nonce 2D +1) CH = E PKD (tag#, h) [C||CH] H(C||Nonce 2D +1) ?= h M||Nonce SD +2 = D SK (C)
14
14 Comments An efficient and secure routing protocol for providing anonymous channel and key exchange in ad hoc networks Node SNode DNode 1Node 2 h S = H(tag#, K SD ) M S = [tag# ||S||D||X=g x ||Nonse SD ) C S = E K SD (M S ) packet = [tag# ||hop||h S ||C S ) (tag#,N D,Nonce SD,?,null,T S ) LRT S packet (tag#,N S,null,?,null,T 1 ) LRT 1 (tag#,N 1,null,?,null,T 2 ) LRT 2 h D = H(tag#, K DS ) h D ?= h S (tag#,N 2,?,N S,Nonce SD,T D ) LRT D Node S: K S1, K S2, K SD Node 1: K 1S, K 12, K 1D Node 2: K 2S, K 21, K 2D Node D: K DS, K D1, K D2 session key table
15
15 Comments Path reverse phase Node SNode D Node 1 Node 2 [D||C D ||C 2 ] session key SK=X y =g xy M D = [tag# ||S||D||Y=g y ||Nonce SD +1) C D = E K DS (M D ) C 2 = E K D2 (tag#||Nonce 2D ) D K 2D (C 2 ) to recover tag# C 1 = E K 21 (tag#|| Nonce 12 ) [2||C D ||C 1 ] D K 12 (C 1 ) to recover tag# C S = E K 1S (tag#|| Nonce S1 ) [1||C D ||C S ] D K SD (C D ) to verify Nonce SD +1 session key SK=Y x =g xy (tag#,N 1, Nonce 12,N D, Nonce 2D,T 2 ) LRT 2 (tag#,N S, Nonce S1,N 2, Nonce 12,T 1 ) LRT 1 (tag#,N D, Nonce SD,N 1, Nonce S1,T S ) LRT S
16
16 Comments (cont.) Data transfer phase Node SNode DNode 1Node 2 [S||C||CH] C = E SK (M||Nonce SD +2), h=H(C|| Nonce S1 +1) CH = E S1 (tag#||h) CH = E 12 (tag#||h) [1||C||CH] CH = E 2D (tag#||h) [2||C||CH] Verify H(C|| Nonce 2D +1)?=h M||Nonce SD +2 = D SK (C) Verify H(C|| Nonce S1 +1)?=h h=H(C|| Nonce 12 +1) h=H(C|| Nonce 2D +1) Verify H(C|| Nonce S1 +1)?=h
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.