Secure communications for cluster-based ad hoc networks using node identities

Post on 29-Jan-2016

45 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Secure communications for cluster-based ad hoc networks using node identities. Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Varadharajan et al.’s scheme - PowerPoint PPT Presentation

Transcript

Secure communications for cluster-based ad hoc networks

using node identities

Authors: Jung-San Lee and Chin-Chen Chang

Sources: Journal of Network and Computer Applications, article in press

Reporter: Chun-Ta Li (李俊達 )

2

Outline Motivation Varadharajan et al.’s scheme The proposed scheme Comments

Motivation NTDR (Near Term Digital Radio) environment

3

Varadharajan et al.’s scheme Notations

4

Varadharajan et al.’s scheme (cont.) Authentication phase

5

Varadharajan et al.’s scheme (cont.) Communication phase (same cluster)

6

mhA mhBHID1

1. mhA, HID1, T1, N1,KHID1-mhA [mhB,KS1], SIGmhA-HID1

2. mhB, HID1, T2, N2,KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB

3. mhB, HID1, T3, N2+1,KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID14. HID1, mhA, KHID1-mhA [mhA,mhB,

CERTmhB, LOC{mhB}, KS2],SIGHID1-mhA, T4, N1+1

5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB

6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA

KS = F(KS1, KS2)

Varadharajan et al.’s scheme (cont.) Communication phase (different clusters)

7

The proposed scheme Notations

8

The proposed scheme (cont.) System setup

9

TA MIDi

CHIDj

The proposed scheme (cont.) Authentication phase

10

KMH = (CHID2j)H(T)*Ki

AUC = H(KMH)

The proposed scheme (cont.) Communication phase (same cluster and

within one hop

11

The proposed scheme (cont.) Communication phase (same cluster and not

within one hop

12

The proposed scheme (cont.) Communication phase (different clusters)

13

14

Comments The encrypted message can be revealed by

clusterhead node The conference key (non-interactive)

K1

K2

K3

MID1

MID2

CHID1

K123 = (MID22)*(CHID1

2)H(T’)*K1

K123 = (MID12)*(MID2

2)H(T’)*K2

K123 = (MID12)*(CHID1

2)H(T’)*K3

top related