Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Key management in ad hoc networks
Presenter : saleh abu rahmah
Supervisor: Dr. iman almomani
Ad hoc network
Is a wireless network. It is on flay with no
Infrastructure, all nodes are peers.
Ad hoc advantages
- easy to deploy.
- Many devices such as PDA, Mobile,
Laptop can benefit such networks
Challenges
- implement the network services
Layer wired Ad hoc
Media
Access
CSMA/CD MACA MACAW
Network Proactive protocols:
DV (Rip),
LS (OSPF).
Reactive protocols:
AODVP,
DSR
Transport TCP TCP over wireless
- Security: it's not easy to implement a centralized CA. Any node can join the
network.
RREQ
RREQ
AODV
A
B
C
D
E
F
RREQ
It is A reactive routing protocol used in ad hoc networks.
What is the difference between the proactive and reactive routing
Protocols?
Novel secure and authenticated key distribution protocol
The NSAUKDP provide symmetric key distribution between the source and
Destination, and any two adjacent nodes in the path.
S A B D
Ksd
Ksa
Kab
Ksa
Kab
Kbd
Ksd
Ksb
The protocol uses five phases
1- initialization
2- Route Request phase.
3- Key Setup phase.
4- Authentication phase.
5- Communication phase
The initialization phase
The node have to register itself to a CA before being
deployed in the Network as follow.
A->T : IDA
, KA+
T-> : [IPA
,KA+
]KCA-
,KCA+
S
A
D
Route Request key setup And authentication phase:
HNS=H(NS
)
PacketS=[IPS
,KCS-
]KS-
,KS+
SREQ=broadcast[IDD
, IDS
,PacketS,HNS]
B
PacketA=,[PacketS, IPA
,KCA-
]KA-
,KA+
SREQ=broadcast[IDD
, IDA
,PacketA,HNS]
PacketB=,[PacketS, IPB
,KCB-
]KB-
,KB+
SREQ=broadcast[IDD
, IDB
,PacketB,HNS]
S
A
B
KSD
,KBD
PacketD=[KSD
]KS+
,[KBD
]KB+
,H[KSD
:HNS]
DREP=IDS,PacketD,H[KBD
]
KAB
PacketB=[KSD
]KS+
,[KAB
]KA+
,H[KSD
:HNS]
DREP=IDS,PacketB,H[KAB
]
KAS
PacketB=[KSD
]KS+
,[KSA
]KS+
,H[KSD
:HNS]
DREP=IDS,PacketA,H[KSA
]
S
A
B
D
Ksd
Ksa
Kab
Kbd
Ksd
Kbd
Kab
Ksa
Esa
(Esd
(M))
Dsa
(cipher)
Eab
(Esd
(M))
Dab
(cipher)
Ebd
(Esd
(M))
Dbd
(Dsd
(cipher))
Communication phase

More Related Content

Pres

  • 1. Key management in ad hoc networks Presenter : saleh abu rahmah Supervisor: Dr. iman almomani
  • 2. Ad hoc network Is a wireless network. It is on flay with no Infrastructure, all nodes are peers. Ad hoc advantages - easy to deploy. - Many devices such as PDA, Mobile, Laptop can benefit such networks Challenges - implement the network services Layer wired Ad hoc Media Access CSMA/CD MACA MACAW Network Proactive protocols: DV (Rip), LS (OSPF). Reactive protocols: AODVP, DSR Transport TCP TCP over wireless - Security: it's not easy to implement a centralized CA. Any node can join the network.
  • 3. RREQ RREQ AODV A B C D E F RREQ It is A reactive routing protocol used in ad hoc networks. What is the difference between the proactive and reactive routing Protocols?
  • 4. Novel secure and authenticated key distribution protocol The NSAUKDP provide symmetric key distribution between the source and Destination, and any two adjacent nodes in the path. S A B D Ksd Ksa Kab Ksa Kab Kbd Ksd Ksb The protocol uses five phases 1- initialization 2- Route Request phase. 3- Key Setup phase. 4- Authentication phase. 5- Communication phase
  • 5. The initialization phase The node have to register itself to a CA before being deployed in the Network as follow. A->T : IDA , KA+ T-> : [IPA ,KA+ ]KCA- ,KCA+
  • 6. S A D Route Request key setup And authentication phase: HNS=H(NS ) PacketS=[IPS ,KCS- ]KS- ,KS+ SREQ=broadcast[IDD , IDS ,PacketS,HNS] B PacketA=,[PacketS, IPA ,KCA- ]KA- ,KA+ SREQ=broadcast[IDD , IDA ,PacketA,HNS] PacketB=,[PacketS, IPB ,KCB- ]KB- ,KB+ SREQ=broadcast[IDD , IDB ,PacketB,HNS] S A B KSD ,KBD PacketD=[KSD ]KS+ ,[KBD ]KB+ ,H[KSD :HNS] DREP=IDS,PacketD,H[KBD ] KAB PacketB=[KSD ]KS+ ,[KAB ]KA+ ,H[KSD :HNS] DREP=IDS,PacketB,H[KAB ] KAS PacketB=[KSD ]KS+ ,[KSA ]KS+ ,H[KSD :HNS] DREP=IDS,PacketA,H[KSA ]