140 likes | 265 Views
Secure communications for cluster-based ad hoc networks using node identities. Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Varadharajan et al.’s scheme
E N D
Secure communications for cluster-based ad hoc networks using node identities Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li (李俊達)
Outline • Motivation • Varadharajan et al.’s scheme • The proposed scheme • Comments
Motivation • NTDR (Near Term Digital Radio) environment
Varadharajan et al.’s scheme • Notations
Varadharajan et al.’s scheme (cont.) • Authentication phase
Varadharajan et al.’s scheme (cont.) • Communication phase (same cluster) mhA HID1 mhB 1. mhA, HID1, T1, N1, KHID1-mhA [mhB,KS1], SIGmhA-HID1 2. mhB, HID1, T2, N2, KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB 3. mhB, HID1, T3, N2+1, KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID1 4. HID1, mhA, KHID1-mhA [mhA,mhB, CERTmhB, LOC{mhB}, KS2], SIGHID1-mhA, T4, N1+1 5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB KS = F(KS1, KS2) 6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA
Varadharajan et al.’s scheme (cont.) • Communication phase (different clusters)
The proposed scheme • Notations
The proposed scheme (cont.) • System setup TA MIDi CHIDj
The proposed scheme (cont.) • Authentication phase KMH = (CHID2j)H(T)*Ki AUC = H(KMH)
The proposed scheme (cont.) • Communication phase (same cluster and within one hop
The proposed scheme (cont.) • Communication phase (same cluster and not within one hop
The proposed scheme (cont.) • Communication phase (different clusters)
Comments • The encrypted message can be revealed by clusterhead node • The conference key (non-interactive) K1 K123 = (MID22)*(CHID12)H(T’)*K1 MID1 K2 K123 = (MID12)*(MID22)H(T’)*K2 CHID1 K3 K123 = (MID12)*(CHID12)H(T’)*K3 MID2