Presentation on theme: "Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian."— Presentation transcript:
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian Computer Science Conference (ACSC '04 ), vol. 26, pp. 41-46, 2004 Reporter: Chun-Ta Li ( 李俊達 )
3 Introduction Ad hoc network Wireless connections to route both data and control packets within the network Trust relationship can be threatened by malicious nodes Security demands that all packets be authenticated before being used between nodes
4 Kerberos Kerberos [Kohl and Neuman 1993] symmetric key based indirect authentication mechanism Participants: Kerberos server and communication clients Significant feature Prevention of node identity forgery Detection of replay attacks Establishment of secure channels Mutual endpoint authentication
5 Kaman For ad hoc networks Participants: multiple Kerberos servers and clients Assumptions: All users have a secret key or password known only to them All servers know the hashed passwords of all the users All servers share a secret key with each other server
Your consent to our cookies if you continue to use this website.