180 likes | 311 Views
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks. Ananya Gupta, Anindo Mukherjee, Bin Xie and Dharma P. Agrawal University of Cincinnati Journal of Parallel and Distributed Computing 2007. 2014-10-13 임 형 인. Contents. Introduction Background
E N D
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks Ananya Gupta, Anindo Mukherjee, Bin Xie and Dharma P. Agrawal University of Cincinnati Journal of Parallel and Distributed Computing 2007 2014-10-13 임 형 인
Contents • Introduction • Background • Decentralized key generation schema • Security and Performance Analysis • Conclusion
Introduction (1/4) • Traditional MANET(Mobile Ad hoc NETwork) • Purely consist of mobile nodes • Absence of the centralized authority • Many problems with secure key generation • Because no prior trust relationships • Solution is pre-distribution of secure key
Introduction (2/4) • Cellular-based MANET in reality • The cellular mobile has more than one cellular medium • Bluetooth, Wi-Fi, Infrared, etc medium of MANET Cellular infra Wi-Fi Bluetooth Infrared
Introduction (3/4) • Necessity of MANET in reality • Direct communication between mobiles is cheaper • Cheaper than communication through Cellular infrastructure • Take advantages of cellular infrastructure to MANET • Utilizing a cellular network for key management Authentication from Cellular-infra Authentication from Cellular-infra How to get security?
Introduction (4/4) • In this paper • Propose “Decentralized key generation scheme” for MANET • Multiple BS(Base Station) • Minimize intervention • Scalability of key generation and distribution
Background • Polynomial key scheme • Two variable for one symmetric calculation 1. Input x 1. Input x Symmetric Property 2. Exchange identifier 1 2 3. Input y 3. Input y 4. Same value (secret key)
Decentralized key generation schema (1/5) • Extended form of polynomial key • Four variable for two symmetric calculation Mobile peer Base Station peer
Decentralized key generation schema (2/5) • Cellular infrastructure for key management
Decentralized key generation schema (3/5) • Group-based polynomial • Polynomial exchange between Base Stations
Decentralized key generation schema (4/5) • Polynomial for MS • Distributing polynomials to Mobiles
Decentralized key generation schema (5/5) • Pairwise direct message exchange between Mobiles
Security analysis (1/2) • Hazard of K-degree polynomial key • Compromise entire secret key by compromising ≥K nodes • Hazard of the polynomial key in this paper Possible to calculate original function Compromise more than K nodes Once compromise entire network
Security analysis (2/2) • Security comparison (Yi Cheng et al.) • Bulletproof at sensor node capture attack (while <K) Polynomial scheme
Performance analysis (1/3) • Routing overhead in key exchange
Performance analysis (2/3) • Average latency during the initial key exchange
Performance analysis (3/3) • Key storage overhead comparison (Yi Cheng et al.) • Constant and low storage overhead with whatever size Polynomial scheme
Conclusion • Propose a novel method for cellular-based MANET • MS can enjoy the same trust in MANET • Trust in MS is derived from backbone cellular network • Easy key distribution by polynomial key scheme • Function key distribution and exchanging identifier