1 / 18

Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks

Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks. Ananya Gupta, Anindo Mukherjee, Bin Xie and Dharma P. Agrawal University of Cincinnati Journal of Parallel and Distributed Computing 2007. 2014-10-13 임 형 인. Contents. Introduction Background

sonja
Download Presentation

Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks Ananya Gupta, Anindo Mukherjee, Bin Xie and Dharma P. Agrawal University of Cincinnati Journal of Parallel and Distributed Computing 2007 2014-10-13 임 형 인

  2. Contents • Introduction • Background • Decentralized key generation schema • Security and Performance Analysis • Conclusion

  3. Introduction (1/4) • Traditional MANET(Mobile Ad hoc NETwork) • Purely consist of mobile nodes • Absence of the centralized authority • Many problems with secure key generation • Because no prior trust relationships • Solution is pre-distribution of secure key

  4. Introduction (2/4) • Cellular-based MANET in reality • The cellular mobile has more than one cellular medium • Bluetooth, Wi-Fi, Infrared, etc  medium of MANET Cellular infra Wi-Fi Bluetooth Infrared

  5. Introduction (3/4) • Necessity of MANET in reality • Direct communication between mobiles is cheaper • Cheaper than communication through Cellular infrastructure • Take advantages of cellular infrastructure to MANET • Utilizing a cellular network for key management Authentication from Cellular-infra Authentication from Cellular-infra How to get security?

  6. Introduction (4/4) • In this paper • Propose “Decentralized key generation scheme” for MANET • Multiple BS(Base Station) • Minimize intervention • Scalability of key generation and distribution

  7. Background • Polynomial key scheme • Two variable for one symmetric calculation 1. Input x 1. Input x Symmetric Property 2. Exchange identifier 1 2 3. Input y 3. Input y 4. Same value (secret key)

  8. Decentralized key generation schema (1/5) • Extended form of polynomial key • Four variable for two symmetric calculation Mobile peer Base Station peer

  9. Decentralized key generation schema (2/5) • Cellular infrastructure for key management

  10. Decentralized key generation schema (3/5) • Group-based polynomial • Polynomial exchange between Base Stations

  11. Decentralized key generation schema (4/5) • Polynomial for MS • Distributing polynomials to Mobiles

  12. Decentralized key generation schema (5/5) • Pairwise direct message exchange between Mobiles

  13. Security analysis (1/2) • Hazard of K-degree polynomial key • Compromise entire secret key by compromising ≥K nodes • Hazard of the polynomial key in this paper Possible to calculate original function Compromise more than K nodes Once compromise entire network

  14. Security analysis (2/2) • Security comparison (Yi Cheng et al.) • Bulletproof at sensor node capture attack (while <K) Polynomial scheme

  15. Performance analysis (1/3) • Routing overhead in key exchange

  16. Performance analysis (2/3) • Average latency during the initial key exchange

  17. Performance analysis (3/3) • Key storage overhead comparison (Yi Cheng et al.) • Constant and low storage overhead with whatever size Polynomial scheme

  18. Conclusion • Propose a novel method for cellular-based MANET • MS can enjoy the same trust in MANET • Trust in MS is derived from backbone cellular network • Easy key distribution by polynomial key scheme • Function key distribution and exchanging identifier

More Related