Identity-based secure collaboration in wireless ad hoc networks

Slides:



Advertisements
Similar presentations
By Md Emran Mazumder Ottawa University Student no:
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Centre for Wireless Communications University of Oulu, Finland
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Public Key Infrastructure (PKI) Chien-Chung Shen
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Fall 2006CS 395: Computer Security1 Key Management.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
Lightweight Mutual Authentication for IoT and Its Applications
Security Issues With Mobile IP
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Ad-hoc Networks.
Packet Leashes: Defense Against Wormhole Attacks
e-Health Platform End 2 End encryption
Encryption
Digital Signature.
CSE 4340/5349 Mobile Systems Engineering
Mobile ad hoc networking: imperatives and challenges
Pooja programmer,cse department
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Multi-party Authentication in Web Services
Lecture 4 - Cryptography
CLIENT/SERVER COMPUTING ENVIRONMENT
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Amar B. Patel , Shushan Zhao
Key Management Network Systems Security
Key Management and Distribution
Lecture 10: Network Security.
Install AD Certificate Services
Public-Key, Digital Signatures, Management, Security
Security in SDR & cognitive radio
Instructor Materials Chapter 5: Ensuring Integrity
Potential L2 security options for UL BCS
Introduction to Cryptography
A Model For Network Security
Lecture 36.
Lecture 36.
Presentation transcript:

Identity-based secure collaboration in wireless ad hoc networks Jianping Pan, Lin Cai, Xuemin Shen, Jon W.Mark University of Victory & University of Waterloo (Computer Networks, 2007) 2007.10.02 Jinho Seol

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Contents Introduction Security Voluntary collaboration Evaluation Conclusions Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Introduction [1/2] Wireless ad hoc networks Self-organized systems without any preexisting, fixed communication infrastructures Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Introduction [2/2] Challenges in ad hoc networks Guarantee that they exchange information with intended peers Assurance that the confidentiality, integrity, and authenticity of information exchange (as packets are relayed by peers without preestablished trustworthiness) Measures to stimulate and compensate favorable collaborations Benefit from secure collaboration for entire system among selfish peers Security & Voluntary collaboration Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Security [1/4] Security threats & Challenges Pairwise trustworthiness among all peers is impractical Autonomous peers can eavesdrop or corrupt replayed data Malicious peers can impersonate other peers If there are colluding peers, entire system is down Traditional PKI approach Feasible but problematic No online authorities that can always be involved Per-hop level security (not only end-to-end) Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Security [2/4] Identity-based cryptography(IBC) A form of public-key cryptography(PKC) Public-key of an entity can be derived from its identity directly Key generation center(KGC) Unique public as identity(ex. Network address or email address) Master keys are generated and kept secretly Private keys computed Proposed in smart card at first KGC Random Seed Key Identity Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Security [3/4] Public key cryptosystem Identity based cryptosystem Message Encryption Channel Decryption Message Private Key Public Key Directory CAs Seed Message Encryption Channel Decryption Message Identity Key Key Generator Seed Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Security [4/4] Public key signature scheme Identity based signature scheme Message Encryption Channel Decryption Message Private Key Public Key Directory CAs Seed Message Encryption Channel Decryption Message Identity Key Key Generator Seed Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Voluntary Collaboration [1/3] Acceptable when peers are genuine, collaborative, and under the control of a single authority j j b b b b i k i c k b a b c Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Voluntary Collaboration [2/3] Peer strategies in ad hoc networks Voluntary Collaborative Solely selfish Challenges If peers are selfish? ex> battery-powered peers Solution Collaboration strategies – The profitability principle Solely selfish peers may want to be collaborative Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Voluntary Collaboration [3/3] The profitability principle Voluntary peers are compensated A peer can join the network with a certain amount of credit Destination payer model is used 2 types of expense to get data Cost to obtain Cost to move j i k Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Evaluation [1/4] Network topology Peer demography Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Evaluation [2/4] Remaining energy in different demographic scenarios Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Evaluation [3/4] General demographic remaining energy & obtained info Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Evaluation [4/4] System performance metrics Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Conclusions Identity-based secure collaboration IBC To ensure information confidentiality, integrity, and authenticity The profitability principle To encourage selfish peers to collaborate Summary Peer collaboration is essential part of wireless ad hoc networks Peer authentication methods using IBC Participation as collaborative peers Identity-Based Secure Collaboration in Wireless Ad Hoc Networks

Identity-Based Secure Collaboration in Wireless Ad Hoc Networks Extra Concerns KGC Security problem Evaluation The general demographic scenario is not realistic Identity-Based Secure Collaboration in Wireless Ad Hoc Networks