1 / 16

Ad Hoc Ideas

Ad Hoc Ideas. December 9, 2003. Team Initech : Marc Bollinger Greg Hartman David Scheiderich Steve Sobenko. Outline. Security Enhanced Via Mobility Elliptical Curve Encryption Sensor Networks. Mobility Helps Security in Ad Hoc Networks.

iago
Download Presentation

Ad Hoc Ideas

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ad Hoc Ideas December 9, 2003 Team Initech: Marc Bollinger Greg Hartman David Scheiderich Steve Sobenko

  2. Outline • Security Enhanced Via Mobility • Elliptical Curve Encryption • Sensor Networks

  3. Mobility Helps Security in Ad Hoc Networks Srdjan Čapkun, Jean-Pierre Hubaux, and Levente Buttyán

  4. The Lowdown • Mobility is not a hurdle • Normal “static” security does not work well for an ad hoc network. • A “dynamic” approach is needed. • Key exchange is achieved via human interactions • Assumes existence of a secure out-of-band communication channel

  5. Human Interactions • Distribution of keys is based on the interactions of humans • Direct one-on-one • Indirect via a mutually trusted friend • Security is based on trusting other users

  6. Implementation • Requires a secure out-of-band communication channel (SSCH) • Two topologies: • Purely ad hoc • Central authority

  7. Protocols For Establishing Trust • Direct exchange of cryptographic material via SSCH between two nodes. • Exchange through a common, trusted friend. • Exchange through a friend who has physically encountered another node.

  8. Generic Implementations of Elliptic Curve Cryptography using Partial Reduction Nils Gura Hans Eberle Sheueling Chang Shantz

  9. What is an Elliptical Curve? http://www.rsasecurity.com/rsalabs/faq/2-3-10.html

  10. RSA/DSA Key length ECC Key Length for Equivalent Security 1024 160 2048 224 3072 256 7680 384 15360 512 ECC • Points generated by: • y2 = x3 + ax + b • Strength comparison: http://www.eas.asu.edu/~cse450sp/projects/final_P113.doc

  11. SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar

  12. Ad Hoc Sensor Network Uses • Emergency response information • Energy management • Medical Monitoring • Logistics and inventory management • Battlefield management

  13. Hardware • TinyOS Based devices • 4 Mhz • 8 Kb instruction • 512 bytes of RAM • 10 kbps bandwidth over RF

  14. Implementation • Every node has: • Counter • Symmetric key between each node • Messages sent using a MAC composed of key and message • Provides weak freshness • Nonces used to strong freshness

  15. Possible Projects • Sensor Based • Car • Traffic lights • Mobility Based • Secure presentation system • Groupware

  16. Any Questions?

More Related