160 likes | 270 Views
Ad Hoc Ideas. December 9, 2003. Team Initech : Marc Bollinger Greg Hartman David Scheiderich Steve Sobenko. Outline. Security Enhanced Via Mobility Elliptical Curve Encryption Sensor Networks. Mobility Helps Security in Ad Hoc Networks.
E N D
Ad Hoc Ideas December 9, 2003 Team Initech: Marc Bollinger Greg Hartman David Scheiderich Steve Sobenko
Outline • Security Enhanced Via Mobility • Elliptical Curve Encryption • Sensor Networks
Mobility Helps Security in Ad Hoc Networks Srdjan Čapkun, Jean-Pierre Hubaux, and Levente Buttyán
The Lowdown • Mobility is not a hurdle • Normal “static” security does not work well for an ad hoc network. • A “dynamic” approach is needed. • Key exchange is achieved via human interactions • Assumes existence of a secure out-of-band communication channel
Human Interactions • Distribution of keys is based on the interactions of humans • Direct one-on-one • Indirect via a mutually trusted friend • Security is based on trusting other users
Implementation • Requires a secure out-of-band communication channel (SSCH) • Two topologies: • Purely ad hoc • Central authority
Protocols For Establishing Trust • Direct exchange of cryptographic material via SSCH between two nodes. • Exchange through a common, trusted friend. • Exchange through a friend who has physically encountered another node.
Generic Implementations of Elliptic Curve Cryptography using Partial Reduction Nils Gura Hans Eberle Sheueling Chang Shantz
What is an Elliptical Curve? http://www.rsasecurity.com/rsalabs/faq/2-3-10.html
RSA/DSA Key length ECC Key Length for Equivalent Security 1024 160 2048 224 3072 256 7680 384 15360 512 ECC • Points generated by: • y2 = x3 + ax + b • Strength comparison: http://www.eas.asu.edu/~cse450sp/projects/final_P113.doc
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar
Ad Hoc Sensor Network Uses • Emergency response information • Energy management • Medical Monitoring • Logistics and inventory management • Battlefield management
Hardware • TinyOS Based devices • 4 Mhz • 8 Kb instruction • 512 bytes of RAM • 10 kbps bandwidth over RF
Implementation • Every node has: • Counter • Symmetric key between each node • Messages sent using a MAC composed of key and message • Provides weak freshness • Nonces used to strong freshness
Possible Projects • Sensor Based • Car • Traffic lights • Mobility Based • Secure presentation system • Groupware