1 / 14

Secure communications for cluster-based ad hoc networks using node identities

Secure communications for cluster-based ad hoc networks using node identities. Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Varadharajan et al.’s scheme

sonja
Télécharger la présentation

Secure communications for cluster-based ad hoc networks using node identities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure communications for cluster-based ad hoc networks using node identities Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li (李俊達)

  2. Outline • Motivation • Varadharajan et al.’s scheme • The proposed scheme • Comments

  3. Motivation • NTDR (Near Term Digital Radio) environment

  4. Varadharajan et al.’s scheme • Notations

  5. Varadharajan et al.’s scheme (cont.) • Authentication phase

  6. Varadharajan et al.’s scheme (cont.) • Communication phase (same cluster) mhA HID1 mhB 1. mhA, HID1, T1, N1, KHID1-mhA [mhB,KS1], SIGmhA-HID1 2. mhB, HID1, T2, N2, KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB 3. mhB, HID1, T3, N2+1, KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID1 4. HID1, mhA, KHID1-mhA [mhA,mhB, CERTmhB, LOC{mhB}, KS2], SIGHID1-mhA, T4, N1+1 5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB KS = F(KS1, KS2) 6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA

  7. Varadharajan et al.’s scheme (cont.) • Communication phase (different clusters)

  8. The proposed scheme • Notations

  9. The proposed scheme (cont.) • System setup TA MIDi CHIDj

  10. The proposed scheme (cont.) • Authentication phase KMH = (CHID2j)H(T)*Ki AUC = H(KMH)

  11. The proposed scheme (cont.) • Communication phase (same cluster and within one hop

  12. The proposed scheme (cont.) • Communication phase (same cluster and not within one hop

  13. The proposed scheme (cont.) • Communication phase (different clusters)

  14. Comments • The encrypted message can be revealed by clusterhead node • The conference key (non-interactive) K1 K123 = (MID22)*(CHID12)H(T’)*K1 MID1 K2 K123 = (MID12)*(MID22)H(T’)*K2 CHID1 K3 K123 = (MID12)*(CHID12)H(T’)*K3 MID2

More Related