160 likes | 276 Views
This document outlines innovative security techniques for ad hoc networks, highlighting how mobility can enhance security rather than hinder it. It introduces Elliptic Curve Cryptography for secure key exchanges, emphasizing human interaction as a method for key distribution, while ensuring secure out-of-band communication channels. The paper discusses implementations of security protocols in various applications, such as emergency response and medical monitoring, leveraging the capabilities of sensor networks and TinyOS-based devices.
E N D
Ad Hoc Ideas December 9, 2003 Team Initech: Marc Bollinger Greg Hartman David Scheiderich Steve Sobenko
Outline • Security Enhanced Via Mobility • Elliptical Curve Encryption • Sensor Networks
Mobility Helps Security in Ad Hoc Networks Srdjan Čapkun, Jean-Pierre Hubaux, and Levente Buttyán
The Lowdown • Mobility is not a hurdle • Normal “static” security does not work well for an ad hoc network. • A “dynamic” approach is needed. • Key exchange is achieved via human interactions • Assumes existence of a secure out-of-band communication channel
Human Interactions • Distribution of keys is based on the interactions of humans • Direct one-on-one • Indirect via a mutually trusted friend • Security is based on trusting other users
Implementation • Requires a secure out-of-band communication channel (SSCH) • Two topologies: • Purely ad hoc • Central authority
Protocols For Establishing Trust • Direct exchange of cryptographic material via SSCH between two nodes. • Exchange through a common, trusted friend. • Exchange through a friend who has physically encountered another node.
Generic Implementations of Elliptic Curve Cryptography using Partial Reduction Nils Gura Hans Eberle Sheueling Chang Shantz
What is an Elliptical Curve? http://www.rsasecurity.com/rsalabs/faq/2-3-10.html
RSA/DSA Key length ECC Key Length for Equivalent Security 1024 160 2048 224 3072 256 7680 384 15360 512 ECC • Points generated by: • y2 = x3 + ax + b • Strength comparison: http://www.eas.asu.edu/~cse450sp/projects/final_P113.doc
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar
Ad Hoc Sensor Network Uses • Emergency response information • Energy management • Medical Monitoring • Logistics and inventory management • Battlefield management
Hardware • TinyOS Based devices • 4 Mhz • 8 Kb instruction • 512 bytes of RAM • 10 kbps bandwidth over RF
Implementation • Every node has: • Counter • Symmetric key between each node • Messages sent using a MAC composed of key and message • Provides weak freshness • Nonces used to strong freshness
Possible Projects • Sensor Based • Car • Traffic lights • Mobility Based • Secure presentation system • Groupware