1 / 10

Authentication paramount practices in wireless networks

Authentication paramount practices in wireless networks . By: Ahmad Almadhor and Aaron Black. Reasons for authentication. To prevent unwanted users from gaining access to the network i.e. Only paying members should have access Ensure network integrity i.e. Only teachers can see grades

zeheb
Download Presentation

Authentication paramount practices in wireless networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black

  2. Reasons for authentication • To prevent unwanted users from gaining access to the network • i.e. Only paying members should have access • Ensure network integrity • i.e. Only teachers can see grades • Protect vital information • i.e. Medical records, Legal records

  3. Goals for authentication scheme • It should be efficient • memory • financial cost • processor consumption • Centralized v.s. Decentralized structure

  4. Current Ideas • Distributed Authentication • Remote Passwords • LEAP+ • Broadcast Authentication • And many more

  5. Distributed Authentication • Focuses on collectively storing authentication information • Uses tokens to store and pass authentication information • Designed to reduce cost by moving away from a centralized approach

  6. Remote Passwords • Uses Secure Remote Password (SRP) protocol with concepts from Simple Authentication for the Web (SAW) • It is decentralized

  7. LEAP+ • Uses four types of keys for each sensor node • Computational cost is desirable • Storage requirement is efficient

  8. Broadcast Authentication • Computational and communication cost minimized • Four Public Key Cryptography PKC schemes proposed in paper • Certificate-Based • Merkle Hash Tree • Enhanced Merkle Hash Tree • ID-Based

  9. Our Contribution • Proving the more efficient authentication approach that is available recently. • Scrutinize such mechanisms feasibility or investigating it. • As of right now we are still gathering information • Will be displayed in final presentation

  10. References Machiraju, Sridhar, Hao Chen, and Jean Bolot. "Distributed Authentication for Low-Cost Wireless Networks." Proceeding HotMobile '08 Proceedings of the 9th Workshop on Mobile Computing Systems and Applications (2008): 55-59. ACM Digital Library. Web. 20 Mar. 2013. <http://delivery.acm.org/10.1145/1420000/1411774/p55-machiraju.pdf?ip=129.252.141.151&acc=ACTIVE%20SERVICE&CFID=296025477&CFTOKEN=40067772&__acm__=1363816425_f12964a7c52a4b8eda5a1b41848a07b6> Ren, et al., “On Broadcast Authentication in Wireless Sensor Networks” <http://www.cnsr.ictas.vt.edu/publication/WASA06-Ren.pdf> Zhu, et al., “LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks.” <http://www.cse.psu.edu/~szhu/papers/leap.pdf> Harding, et al., "Wireless authentication using remote passwords" <http://delivery.acm.org/10.1145/1360000/1352538/p24-harding.pdf?ip=129.252.141.151&acc=ACTIVE%20SERVICE&CFID=304943476&CFTOKEN=53005851&__acm__=1364581717_77782d3ca14fa418eab339f5f69e8c74>

More Related