1 / 20

Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues

Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues. Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy Luiz A. DaSilva, and Jean-Jacques Quisquater (Q2SWinet’05). 2006.9.26 Presented by Yu, Yeongjae. SALAB at KAIST. Contents. Introduction

kamal
Download Presentation

Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy Luiz A. DaSilva, and Jean-Jacques Quisquater (Q2SWinet’05) 2006.9.26 Presented by Yu, Yeongjae SALAB at KAIST

  2. Contents • Introduction • Authentication Process • Authentication States for a Supplicant • Taxonomy of Authentication Protocols • Authentication Management Architecture • Conclusion 2 CNLAB at KAIST SALAB at KAIST

  3. Need for authentication classification Three major criteria for classification • To interpret the similarities between sets of related protocols • To understand the motivation behind each • To better analyze and compare protocols with respect to their encapsulating class rather than individual protocols • To identify common vulnerabilities and attacks against each class of authentication protocols • To identify common architectural elements in each class • A node’s role in the authentication for classification • Type of credentials used for authentication • Phase during which the establishment of credentials take place Introduction 1. Introduction 3 SALAB at KAIST

  4. Authentication Process 2. Authentication Process 4 SALAB at KAIST

  5. Authentication States 3. Authentication States for a Supplicant 5 SALAB at KAIST

  6. Classification based on • Node role • Type of credentials • Establishment of credentials Taxonomy of Authentication Protocols 4. Taxonomy of Authentication Protocols 6 SALAB at KAIST

  7. Taxonomy of Authentication Protocols 4-1. Classification based on node role 7 SALAB at KAIST

  8. Taxonomy of Authentication Protocols 4-2. Classification based on type of credentials 8 SALAB at KAIST

  9. Taxonomy of Authentication Protocols 4-3. Classification based on establishment of credentials 9 SALAB at KAIST

  10. Need for authentication management Factors that affect the performance of the authentication operation • Enhanced performance • Interoperability in today’s networks • A) The network traffic load • B) The number of authentication servers • C) Servers’ placement Authentication Management Architecture 5. Authentication Management Architecture 10 SALAB at KAIST

  11. Simulation environment • 10x10 grid of nodes • 20, 40, 60, 80 100, 150, and 200 UDP flows (for A) • Before a flow starts, the source and destination nodes should authenticate on another through an authentication server • 1,2,3, and 4 authentication servers (for B) • Two placement model (for C) Authentication Management Architecture 5. Authentication Management Architecture (cont’d) 11 SALAB at KAIST

  12. Authentication Management Architecture 5. Authentication Management Architecture (cont’d) Model 2 Model 1 12 SALAB at KAIST

  13. Authentication Management Architecture 5.1 Effect of load 13 SALAB at KAIST

  14. Authentication Management Architecture 5.2 Authentication of flows 14 SALAB at KAIST

  15. Authentication Management Architecture 5.3 Number of servers 15 SALAB at KAIST

  16. Authentication Management Architecture 5.4 Placement of servers 16 Trade off between authentication delay and packet loss SALAB at KAIST

  17. Authentication Management Architecture 5.4 Placement of servers Effect of AS Placement on Packet Loss Packet Loss 17 Trade off between authentication delay and packet loss SALAB at KAIST

  18. Authentication Management Architecture 5.5 Hierarchical deployment model 18 Trade off between security and performance SALAB at KAIST

  19. Summary • A generic authentication process • A taxonomy of authentication protocols • Counterintuitive increase in delay as the number of authentication severs increases for a high number of flows • -> highlighting the need for authentication management • Discussion • Taxonomy in ad hoc network? • Meaning of ‘management’ and ‘interoperability’ ? • Need for specific simulation explanation • How about expending 10X10 topology to broader scale? Conclusion 6. Conclusion 19 SALAB at KAIST

  20. [1] S. Zhu, S. Xu, S. Setia and S. Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks.” In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003 [2] A. Weimerskirch and G. Thonet, “A Distributed Light-Weight Authentication Model for Ad-hoc Networks.” In Proc. of 4th International Conference on Information Security and Cryptology (ICISC 2001), 6-7 December 2001. [3] D. Balfanz, D. K. Smetters, P. Stewart and H. Chi. Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.” In Symposium on Network and Distributed Systems Security (NDSS '02). [4] L. Venkatraman and D. Agrawal, “A Novel Authentication Scheme for Ad Hoc Networks.” In IEEE Wireless Communications and Networking Conference (WCNC2000), vol. 3, pp. 1268--1273, 2000. . . . Reference * Reference 20 SALAB at KAIST

More Related