140 likes | 271 Views
This paper presents a secure communication scheme specifically designed for cluster-based ad hoc networks, utilizing node identities to enhance authentication and data integrity. The proposed scheme addresses vulnerabilities in existing approaches and is suitable for Near-Term Digital Radio (NTDR) environments. It elaborates on various phases of communication, including authentication and data transmission both within the same cluster and across different clusters. The relevance of the approach lies in its ability to maintain secure message exchanges, safeguarding against unauthorized access and ensuring reliable network operations.
E N D
Secure communications for cluster-based ad hoc networks using node identities Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li (李俊達)
Outline • Motivation • Varadharajan et al.’s scheme • The proposed scheme • Comments
Motivation • NTDR (Near Term Digital Radio) environment
Varadharajan et al.’s scheme • Notations
Varadharajan et al.’s scheme (cont.) • Authentication phase
Varadharajan et al.’s scheme (cont.) • Communication phase (same cluster) mhA HID1 mhB 1. mhA, HID1, T1, N1, KHID1-mhA [mhB,KS1], SIGmhA-HID1 2. mhB, HID1, T2, N2, KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB 3. mhB, HID1, T3, N2+1, KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID1 4. HID1, mhA, KHID1-mhA [mhA,mhB, CERTmhB, LOC{mhB}, KS2], SIGHID1-mhA, T4, N1+1 5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB KS = F(KS1, KS2) 6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA
Varadharajan et al.’s scheme (cont.) • Communication phase (different clusters)
The proposed scheme • Notations
The proposed scheme (cont.) • System setup TA MIDi CHIDj
The proposed scheme (cont.) • Authentication phase KMH = (CHID2j)H(T)*Ki AUC = H(KMH)
The proposed scheme (cont.) • Communication phase (same cluster and within one hop
The proposed scheme (cont.) • Communication phase (same cluster and not within one hop
The proposed scheme (cont.) • Communication phase (different clusters)
Comments • The encrypted message can be revealed by clusterhead node • The conference key (non-interactive) K1 K123 = (MID22)*(CHID12)H(T’)*K1 MID1 K2 K123 = (MID12)*(MID22)H(T’)*K2 CHID1 K3 K123 = (MID12)*(CHID12)H(T’)*K3 MID2