230 likes | 355 Views
A key agreement protocol using mutual Authentication for Ad-Hoc Networks. IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29 Presented by Fei-Yau, Hung. Outline. Introduction Review of the Huang-Chang Scheme The proposed scheme
E N D
A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29 Presented by Fei-Yau, Hung
Outline • Introduction • Review of the Huang-Chang Scheme • The proposed scheme • Security analysis • Conclusion
Introduction • Wireless technology has become more pervasive as E-Commerce and other applications communication platform. • Two kinds of network structures in wireless area network • Infrastructure • Infrastructureless
Introduction • Properties concerned for security design in MANET (Ad-Hoc network) : • Self-organize • Fully decentralized • Dynamic topology • Low computation power
Review of the Huang-Chang Scheme • Notations
Review of the Huang-Chang Scheme • Notations
Review of the Huang-Chang Scheme • Tree structure illustrates the membership
Review of the Huang-Chang Scheme • Key initiation phase
Review of the Huang-Chang Scheme • Authenticating the legal children
Review of the Huang-Chang Scheme • Session Key Generation phase
Review of the Huang-Chang Scheme • The flows of Huang-Chang’s Scheme • The replay attack : attacker collects multiple pairs, while the group is establishing. • The password guessing attack • Performance : must repeat n times to compute for each member
The proposed scheme • Key initiation phase
The proposed scheme • Key initiation phase
The proposed scheme • Session key generation phase
Example Node1 broadcast Node11 broadcast
Example • All members compute their own session key , and send to the checker . • Finally, the checker will check all member’s session key.
The proposed scheme • Session key Update periodically
Security analysis • Dynamic key agreement protocol requirements • Group key secrecy • Key independency • Forward and backward secrecy
Security analysis • Compare with Huang & Chang’s scheme • This protocol using nonce value to prevent the replay attack. • Password guessing attack does not wok.
Security analysis • Performance Discussion
Conclusion • Adding mutual authentication to avoid replay attack. • Modifying transcripts to prevent password guessing attack. • Periodical session key updating makes the ciphertext or chosen plaintext attack have no chance to happen. • The system can work well in the MANET environment.