Secure communications for cluster-based ad hoc networks using node identities
description
Transcript of Secure communications for cluster-based ad hoc networks using node identities
Secure communications for cluster-based ad hoc networks
using node identities
Authors: Jung-San Lee and Chin-Chen Chang
Sources: Journal of Network and Computer Applications, article in press
Reporter: Chun-Ta Li (李俊達 )
2
Outline Motivation Varadharajan et al.’s scheme The proposed scheme Comments
Motivation NTDR (Near Term Digital Radio) environment
3
Varadharajan et al.’s scheme Notations
4
Varadharajan et al.’s scheme (cont.) Authentication phase
5
Varadharajan et al.’s scheme (cont.) Communication phase (same cluster)
6
mhA mhBHID1
1. mhA, HID1, T1, N1,KHID1-mhA [mhB,KS1], SIGmhA-HID1
2. mhB, HID1, T2, N2,KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB
3. mhB, HID1, T3, N2+1,KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID14. HID1, mhA, KHID1-mhA [mhA,mhB,
CERTmhB, LOC{mhB}, KS2],SIGHID1-mhA, T4, N1+1
5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB
6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA
KS = F(KS1, KS2)
Varadharajan et al.’s scheme (cont.) Communication phase (different clusters)
7
The proposed scheme Notations
8
The proposed scheme (cont.) System setup
9
TA MIDi
CHIDj
The proposed scheme (cont.) Authentication phase
10
KMH = (CHID2j)H(T)*Ki
AUC = H(KMH)
The proposed scheme (cont.) Communication phase (same cluster and
within one hop
11
The proposed scheme (cont.) Communication phase (same cluster and not
within one hop
12
The proposed scheme (cont.) Communication phase (different clusters)
13
14
Comments The encrypted message can be revealed by
clusterhead node The conference key (non-interactive)
K1
K2
K3
MID1
MID2
CHID1
K123 = (MID22)*(CHID1
2)H(T’)*K1
K123 = (MID12)*(MID2
2)H(T’)*K2
K123 = (MID12)*(CHID1
2)H(T’)*K3