1 / 23

A key agreement protocol using mutual Authentication for Ad-Hoc Networks

A key agreement protocol using mutual Authentication for Ad-Hoc Networks. IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29 Presented by Fei-Yau, Hung. Outline. Introduction Review of the Huang-Chang Scheme The proposed scheme

bikita
Download Presentation

A key agreement protocol using mutual Authentication for Ad-Hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29 Presented by Fei-Yau, Hung

  2. Outline • Introduction • Review of the Huang-Chang Scheme • The proposed scheme • Security analysis • Conclusion

  3. Introduction • Wireless technology has become more pervasive as E-Commerce and other applications communication platform. • Two kinds of network structures in wireless area network • Infrastructure • Infrastructureless

  4. Introduction • Properties concerned for security design in MANET (Ad-Hoc network) : • Self-organize • Fully decentralized • Dynamic topology • Low computation power

  5. Review of the Huang-Chang Scheme • Notations

  6. Review of the Huang-Chang Scheme • Notations

  7. Review of the Huang-Chang Scheme • Tree structure illustrates the membership

  8. Review of the Huang-Chang Scheme • Key initiation phase

  9. Review of the Huang-Chang Scheme • Authenticating the legal children

  10. Review of the Huang-Chang Scheme • Session Key Generation phase

  11. Review of the Huang-Chang Scheme • The flows of Huang-Chang’s Scheme • The replay attack : attacker collects multiple pairs, while the group is establishing. • The password guessing attack • Performance : must repeat n times to compute for each member

  12. The proposed scheme • Key initiation phase

  13. The proposed scheme • Key initiation phase

  14. The proposed scheme • Session key generation phase

  15. Example

  16. Example

  17. Example Node1 broadcast Node11 broadcast

  18. Example • All members compute their own session key , and send to the checker . • Finally, the checker will check all member’s session key.

  19. The proposed scheme • Session key Update periodically

  20. Security analysis • Dynamic key agreement protocol requirements • Group key secrecy • Key independency • Forward and backward secrecy

  21. Security analysis • Compare with Huang & Chang’s scheme • This protocol using nonce value to prevent the replay attack. • Password guessing attack does not wok.

  22. Security analysis • Performance Discussion

  23. Conclusion • Adding mutual authentication to avoid replay attack. • Modifying transcripts to prevent password guessing attack. • Periodical session key updating makes the ciphertext or chosen plaintext attack have no chance to happen. • The system can work well in the MANET environment.

More Related