Secure communications for cluster-based ad hoc networks using node identities

14
Secure communications for cluster-based ad hoc networks using node identities Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李李李 )

description

Secure communications for cluster-based ad hoc networks using node identities. Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Varadharajan et al.’s scheme - PowerPoint PPT Presentation

Transcript of Secure communications for cluster-based ad hoc networks using node identities

Page 1: Secure communications for cluster-based ad hoc networks using node identities

Secure communications for cluster-based ad hoc networks

using node identities

Authors: Jung-San Lee and Chin-Chen Chang

Sources: Journal of Network and Computer Applications, article in press

Reporter: Chun-Ta Li (李俊達 )

Page 2: Secure communications for cluster-based ad hoc networks using node identities

2

Outline Motivation Varadharajan et al.’s scheme The proposed scheme Comments

Page 3: Secure communications for cluster-based ad hoc networks using node identities

Motivation NTDR (Near Term Digital Radio) environment

3

Page 4: Secure communications for cluster-based ad hoc networks using node identities

Varadharajan et al.’s scheme Notations

4

Page 5: Secure communications for cluster-based ad hoc networks using node identities

Varadharajan et al.’s scheme (cont.) Authentication phase

5

Page 6: Secure communications for cluster-based ad hoc networks using node identities

Varadharajan et al.’s scheme (cont.) Communication phase (same cluster)

6

mhA mhBHID1

1. mhA, HID1, T1, N1,KHID1-mhA [mhB,KS1], SIGmhA-HID1

2. mhB, HID1, T2, N2,KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB

3. mhB, HID1, T3, N2+1,KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID14. HID1, mhA, KHID1-mhA [mhA,mhB,

CERTmhB, LOC{mhB}, KS2],SIGHID1-mhA, T4, N1+1

5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB

6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA

KS = F(KS1, KS2)

Page 7: Secure communications for cluster-based ad hoc networks using node identities

Varadharajan et al.’s scheme (cont.) Communication phase (different clusters)

7

Page 8: Secure communications for cluster-based ad hoc networks using node identities

The proposed scheme Notations

8

Page 9: Secure communications for cluster-based ad hoc networks using node identities

The proposed scheme (cont.) System setup

9

TA MIDi

CHIDj

Page 10: Secure communications for cluster-based ad hoc networks using node identities

The proposed scheme (cont.) Authentication phase

10

KMH = (CHID2j)H(T)*Ki

AUC = H(KMH)

Page 11: Secure communications for cluster-based ad hoc networks using node identities

The proposed scheme (cont.) Communication phase (same cluster and

within one hop

11

Page 12: Secure communications for cluster-based ad hoc networks using node identities

The proposed scheme (cont.) Communication phase (same cluster and not

within one hop

12

Page 13: Secure communications for cluster-based ad hoc networks using node identities

The proposed scheme (cont.) Communication phase (different clusters)

13

Page 14: Secure communications for cluster-based ad hoc networks using node identities

14

Comments The encrypted message can be revealed by

clusterhead node The conference key (non-interactive)

K1

K2

K3

MID1

MID2

CHID1

K123 = (MID22)*(CHID1

2)H(T’)*K1

K123 = (MID12)*(MID2

2)H(T’)*K2

K123 = (MID12)*(CHID1

2)H(T’)*K3