140 likes | 352 Views
Security – Ad hoc networks. - Swetha Kulkarni. Ad hoc networks. No fixed infrastructure such as base stations or mobile switching centers. Security Requirements. Confidentiality Integrity Availability Authorization Dependability and reliability Accountability. External Threats.
E N D
Security – Ad hoc networks - SwethaKulkarni
Ad hoc networks • No fixed infrastructure such as base stations or mobile switching centers
Security Requirements • Confidentiality • Integrity • Availability • Authorization • Dependability and reliability • Accountability.
External Threats • Passive eavesdropping • Active Interference
Internal Threats • Failed Nodes – Unable to perform basic operations • Badly Failed Nodes – False Routing Information • Selfish Nodes – own advantage • Malicious Nodes- deliberately disrupt the correct operation
Key Management • Trust Model – How much different elements in the network can trust each other • Cryptosystems- Public Key Cryptography or Symmetric Cryptography • Key Creation – Which nodes/parties are allowed to create keys • Key Storage – • Key Distribution -
Authentication and Key Management Proposals • Self-Organized Public-Key Management • Authentication based on polynomial secret sharing
Self-Organized Public-Key Management based • Similar to PGP • Certificates are stored and distributed by the nodes themselves. • Each node maintains – local certificate directory
Authentication based on polynomial secret sharing • Certificate generated by set of nodes • an entity is trusted if any k trusted entities claim so • Locally trusted entity – globally trusted
Conclusion • Security sensitive applications of ad hoc networks require high degree of security. • Ad hoc networks are inherently vulnerable to attacks
References • “Securing Ad Hoc Networks “- LidongZhou , Zygmunt J. Haas, Cornell University • “Distributed Authentication and Key Management “- Yijun Mo, Fei Wang, BenXiong Huang, ShuhuaXu • “Security in Ad Hoc Networks” - VesaKärpijoki Helsinki University of Technology • “Security Vulnerabilities in Ad Hoc Networks” – PoWahYauand Chris J. Mitchell