GROUP N. Charles Barrasso Carter May Chih-Yu (Joey) Tang. A Survey of Key Management for Secure Group Communication. Sandro Rafaeli David Hutchison. Goals and Metrics. Storage requirements Overhead traffic minimization Backward and forward secrecy
Chih-Yu (Joey) Tang
Sheueling Chang Shantz
Uses points where the curve exactly crosses integer (x,y) coordinates to generate group of points.
These points are ideal for SPEKE, Diffie-Hellman, and other methods and are actually much smaller and faster than those used in traditionally, while providing an equivalent level of security.Elliptic Curve Cryptography
Yunghsiang S. Han
Pramod K. Varshney
SPINS: Security Protocols for Sensor Networks Collaborative Groups
Department of Electrical Engineering and Computer Sciences, UC Berkeley
Sensor Hardware Collaborative Groups
What are the issues?
Communication is the big chuck on energy consumption, therefore when developing a security structure for Sensor Network, minimizing the communication overhead is the focus.
The characteristics of the Sensor Network restrict its ability to adapt the existing security technologies.
Compromised security is inevitable for current Sensor Network.
SPINS: SNEP & Collaborative GroupsμTESLA
SNEP: one to one agreement
μTESLA: for broadcasting (original TESLA is not for Sensor Networks)
Mobility Helps Security in AdHoc Networks Collaborative Groups
Laboratory for Computer Communications and Applications (LAC)
School of Information and Communication Sciences (I&C)
Swiss Federal Institute of Technology Lausanne (EPFL)
Static, Central Control Collaborative Groups
Security is usually enforced by a static, central authority.
Ex: Communication Network, Operating System, and the access system to the vault of a bank.
Establishing Security Association: purely mutual agreement between users
Ex: Physical contact (wire) or Infrared communication
Two Models Collaborative Groups
Fully self-organized ad hoc networks : no central authority
i can ask a friend to issue a fresh certificate to j
Ad hoc networks with a central authority: a (off-line) central authority
Ex: If a node i possesses a certificate signed by the central authority that binds j with j’s public key, then there exists a one-way security association from i to j.
Mobility Helps Security Collaborative Groups
Simulation shows the higher mobility leads to a faster creation of the security associations
Random walk mobility: nodes move randomly
(Restricted) Random waypoint mobility: choice a destination to move to
Restricted because users normally choose a destination to go to.
Ex: meeting rooms, lounges, and so on.
Experiment result shows