140 likes | 155 Views
This research paper discusses a mechanism for secure communication of cell phones in emergency situations such as hurricanes or terrorist attacks. It focuses on broadcast authentication and revocation of malicious phones to ensure network security.
E N D
Secure emergency communication of cellular phones in ad hoc mode Authors:Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, and Leonard Barolli. Sources: Ad Hoc Networks, 5(1), pp. 126-133, 2007. Reporter: Chun-Ta Li (李俊達)
Outline • Motivation • The proposed mechanism • Comments 2 2
Motivation • Emergency situation • hurricanes • earthquakes • terrorist attacks • Cell phones • connect to the base station (normal mode) • connect to the ad hoc network (ad hoc mode)
Motivation (cont.) • Most of the communications in emergency conditions are broadcasts. • Data confidentiality is not a requirement. • The primary requirement for this situation is broadcast authentication with guaranteed non-repudiation.
Motivation (cont.) • Detection and revocation of malicious phones • To minimize the damage caused by the malicious phones. • Preventing the malicious phones from discrediting non-malicious phones. (DoS attack)
: a private/public key pair of PKG : the session key between BS and CP The proposed mechanism • Notations BS: a base station CP: a cell phone PKG: Private Key Generator (each cell)
The proposed mechanism (cont.) • Setup phase • The base station assigns each phone an ID. • The base station generates a private key for each cell phone corresponding to its ID.
The proposed mechanism (cont.) • Ad hoc mode in emergency situations
The proposed mechanism (cont.) • Key revocation • The normal mode • the base station has all the information of each cell phone • The ad hoc mode • include timestamps in the IDs assigned to each cell phone • the temporary IDs and the corresponding private keys need to be refreshed regularly
The proposed mechanism (cont.) • Secure mobility management (k=2) 4 3 Cell A Cell E PKpkgA PKpkgE Cell D Cell B PKpkgB PKpkgD 1 Cell C PKpkgC 2
The proposed mechanism (cont.) • Detection and revocation of malicious phones • Decision making • maintains a counter for the local revocation messages • Sender must sign the message and broadcasts alocal revocation message to neighbors (receives a malicious message) • a network revocation message is broadcasted throughout the network (the counter reaches a threshold value)
the first phone whose local revocation message counter crosses the pre-defined threshold the node which forwards the broadcast message The proposed mechanism (cont.) • Detection and revocation of malicious phones • Decision broadcast
Comments • Forging PKG attacks (a fake private/public key pair of PKG, ) ‘ ‘ Query PKpkg’ Normal cell Query PKpkg’ Victim cell Broadcast Query PKpkg’ Terrorist SKpkg’ID[M’, ID] || ID ReplyPKpkg’ Query PKpkg’ Normal cell Conspirator Query PKpkg’ Query PKpkg’
Comments (cont.) • Hierarchical structure of cellular networks Administrator … PKG1 PKG2 PKG3 PKGN … … … … …