100 likes | 203 Views
Authentication paramount practices in wireless networks . By: Ahmad Almadhor and Aaron Black. Reasons for authentication. To prevent unwanted users from gaining access to the network i.e. Only paying members should have access Ensure network integrity i.e. Only teachers can see grades
E N D
Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black
Reasons for authentication • To prevent unwanted users from gaining access to the network • i.e. Only paying members should have access • Ensure network integrity • i.e. Only teachers can see grades • Protect vital information • i.e. Medical records, Legal records
Goals for authentication scheme • It should be efficient • memory • financial cost • processor consumption • Centralized v.s. Decentralized structure
Current Ideas • Distributed Authentication • Remote Passwords • LEAP+ • Broadcast Authentication • And many more
Distributed Authentication • Focuses on collectively storing authentication information • Uses tokens to store and pass authentication information • Designed to reduce cost by moving away from a centralized approach
Remote Passwords • Uses Secure Remote Password (SRP) protocol with concepts from Simple Authentication for the Web (SAW) • It is decentralized
LEAP+ • Uses four types of keys for each sensor node • Computational cost is desirable • Storage requirement is efficient
Broadcast Authentication • Computational and communication cost minimized • Four Public Key Cryptography PKC schemes proposed in paper • Certificate-Based • Merkle Hash Tree • Enhanced Merkle Hash Tree • ID-Based
Our Contribution • Proving the more efficient authentication approach that is available recently. • Scrutinize such mechanisms feasibility or investigating it. • As of right now we are still gathering information • Will be displayed in final presentation
References Machiraju, Sridhar, Hao Chen, and Jean Bolot. "Distributed Authentication for Low-Cost Wireless Networks." Proceeding HotMobile '08 Proceedings of the 9th Workshop on Mobile Computing Systems and Applications (2008): 55-59. ACM Digital Library. Web. 20 Mar. 2013. <http://delivery.acm.org/10.1145/1420000/1411774/p55-machiraju.pdf?ip=129.252.141.151&acc=ACTIVE%20SERVICE&CFID=296025477&CFTOKEN=40067772&__acm__=1363816425_f12964a7c52a4b8eda5a1b41848a07b6> Ren, et al., “On Broadcast Authentication in Wireless Sensor Networks” <http://www.cnsr.ictas.vt.edu/publication/WASA06-Ren.pdf> Zhu, et al., “LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks.” <http://www.cse.psu.edu/~szhu/papers/leap.pdf> Harding, et al., "Wireless authentication using remote passwords" <http://delivery.acm.org/10.1145/1360000/1352538/p24-harding.pdf?ip=129.252.141.151&acc=ACTIVE%20SERVICE&CFID=304943476&CFTOKEN=53005851&__acm__=1364581717_77782d3ca14fa418eab339f5f69e8c74>