Upload
sonja
View
48
Download
0
Embed Size (px)
DESCRIPTION
Secure communications for cluster-based ad hoc networks using node identities. Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Varadharajan et al.’s scheme - PowerPoint PPT Presentation
Citation preview
Secure communications for cluster-based ad hoc networks
using node identities
Authors: Jung-San Lee and Chin-Chen Chang
Sources: Journal of Network and Computer Applications, article in press
Reporter: Chun-Ta Li (李俊達 )
2
Outline Motivation Varadharajan et al.’s scheme The proposed scheme Comments
Motivation NTDR (Near Term Digital Radio) environment
3
Varadharajan et al.’s scheme Notations
4
Varadharajan et al.’s scheme (cont.) Authentication phase
5
Varadharajan et al.’s scheme (cont.) Communication phase (same cluster)
6
mhA mhBHID1
1. mhA, HID1, T1, N1,KHID1-mhA [mhB,KS1], SIGmhA-HID1
2. mhB, HID1, T2, N2,KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB
3. mhB, HID1, T3, N2+1,KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID14. HID1, mhA, KHID1-mhA [mhA,mhB,
CERTmhB, LOC{mhB}, KS2],SIGHID1-mhA, T4, N1+1
5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB
6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA
KS = F(KS1, KS2)
Varadharajan et al.’s scheme (cont.) Communication phase (different clusters)
7
The proposed scheme Notations
8
The proposed scheme (cont.) System setup
9
TA MIDi
CHIDj
The proposed scheme (cont.) Authentication phase
10
KMH = (CHID2j)H(T)*Ki
AUC = H(KMH)
The proposed scheme (cont.) Communication phase (same cluster and
within one hop
11
The proposed scheme (cont.) Communication phase (same cluster and not
within one hop
12
The proposed scheme (cont.) Communication phase (different clusters)
13
14
Comments The encrypted message can be revealed by
clusterhead node The conference key (non-interactive)
K1
K2
K3
MID1
MID2
CHID1
K123 = (MID22)*(CHID1
2)H(T’)*K1
K123 = (MID12)*(MID2
2)H(T’)*K2
K123 = (MID12)*(CHID1
2)H(T’)*K3