1 / 12

Security – Ad hoc networks

Security – Ad hoc networks. - Swetha Kulkarni. Ad hoc networks. No fixed infrastructure such as base stations or mobile switching centers. Security Requirements. Confidentiality Integrity Availability Authorization Dependability and reliability Accountability. External Threats.

gordy
Download Presentation

Security – Ad hoc networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security – Ad hoc networks - SwethaKulkarni

  2. Ad hoc networks • No fixed infrastructure such as base stations or mobile switching centers

  3. Security Requirements • Confidentiality • Integrity • Availability • Authorization • Dependability and reliability • Accountability.

  4. External Threats • Passive eavesdropping • Active Interference

  5. Internal Threats • Failed Nodes – Unable to perform basic operations • Badly Failed Nodes – False Routing Information • Selfish Nodes – own advantage • Malicious Nodes- deliberately disrupt the correct operation

  6. Key Management • Trust Model – How much different elements in the network can trust each other • Cryptosystems- Public Key Cryptography or Symmetric Cryptography • Key Creation – Which nodes/parties are allowed to create keys • Key Storage – • Key Distribution -

  7. Authentication and Key Management Proposals • Self-Organized Public-Key Management • Authentication based on polynomial secret sharing

  8. Self-Organized Public-Key Management based • Similar to PGP • Certificates are stored and distributed by the nodes themselves. • Each node maintains – local certificate directory

  9. Authentication based on polynomial secret sharing • Certificate generated by set of nodes • an entity is trusted if any k trusted entities claim so • Locally trusted entity – globally trusted

  10. Conclusion • Security sensitive applications of ad hoc networks require high degree of security. • Ad hoc networks are inherently vulnerable to attacks

  11. References • “Securing Ad Hoc Networks “- LidongZhou , Zygmunt J. Haas, Cornell University • “Distributed Authentication and Key Management “- Yijun Mo, Fei Wang, BenXiong Huang, ShuhuaXu • “Security in Ad Hoc Networks” - VesaKärpijoki Helsinki University of Technology • “Security Vulnerabilities in Ad Hoc Networks” – PoWahYauand Chris J. Mitchell

  12. Thank You

More Related