984403015 林祺凱

18
An efficient secure distributed An efficient secure distributed anonymous routing protocol for anonymous routing protocol for mobile and wireless ad hoc networks mobile and wireless ad hoc networks Azzedine Boukerchea,b, Khalil El- Khatiba, Li Xua and Larry Korbab, Computer Communications, Vol. 28, No. 10., pp. 1193-1203, 16 June 2005. Presenter: Presenter: Chi-Kai Lin Chi-Kai Lin Email: [email protected] Email: [email protected] 1

Upload: national-central-university

Post on 07-Aug-2015

400 views

Category:

Education


5 download

TRANSCRIPT

Page 1: 984403015 林祺凱

An efficient secure distributed An efficient secure distributed anonymous routing protocol for anonymous routing protocol for

mobile and wireless ad hoc networksmobile and wireless ad hoc networks

Azzedine Boukerchea,b, Khalil El-Khatiba, Li Xua and Larry Korbab,

Computer Communications, Vol. 28, No. 10., pp. 1193-1203, 16 June 2005.

Presenter: Presenter: Chi-Kai LinChi-Kai LinEmail: [email protected]: [email protected]

1

Page 2: 984403015 林祺凱

OutlineOutline Introduction Previous and related work A secure distributed anonymous routing proto

col (SDAR)• Path discovery phase• Path reverse phase• Data transfer phase

SDAR protocol characteristics Security analysis Conclusion

22

Page 3: 984403015 林祺凱

Introduction

Mobile Ad hoc Network

(MANET)

Page 4: 984403015 林祺凱

Previous and related work (1/2) Papadimitratos and Haas [14]

• proposed Secure Routing Protocol (SRP) based on DSR[15,16]

Dahill [17] • proposed the Authenticated Routing for Ad hoc

Networks (ARAN)• uses public key cryptography instead of the

shared security association Venkatraman and Agrawal [19]

• proposed an approach for enhancing the security of AODV protocol [20]

• based on public key cryptography

Page 5: 984403015 林祺凱

Previous and related work (2/2)

Shortcomings • only ensure the authenticity but not the

privacy of the routing information• middle nodes in the routing path can

easily find the identity of the communicating nodes

Page 6: 984403015 林祺凱

SDAR: An efficient secure distributed anonymous routing protocol

for mobile and wireless ad hoc networks

66

Page 7: 984403015 林祺凱

1. Path discovery phase (1/2)

77

S

R2

1

3

Path Discovery

S’s MSG

Page 8: 984403015 林祺凱

1. Path discovery phase (2/2)

88

S

R2

1

3

S’s MSG

S’s MSGS’s MSG

Page 9: 984403015 林祺凱

2. Path reverse phase (1/3)

99

S

R2

1

3

R’s Msg

Page 10: 984403015 林祺凱

2. Path reverse phase (2/3)

1010

S

R2

1

3

R’s Msg

Page 11: 984403015 林祺凱

2. Path reverse phase (3/3)

1111

S

R2

1

3R’s Msg

R’s Msg

Page 12: 984403015 林祺凱

3. Data transfer phase (1/4)

1212

DataData

S

R2

1

3

KKRR((DataData))

KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))

Page 13: 984403015 林祺凱

3. Data transfer phase (2/4)

1313

DataData

S

R2

1

3

KKRR((DataData))

KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))

Page 14: 984403015 林祺凱

3. Data transfer phase (3/4)

1414

S

R2

1

3

KK22((KKRR((DataData))))

Page 15: 984403015 林祺凱

3. Data transfer phase (4/4)

1515

S

R2

1

3

KKRR((DataData))

Page 16: 984403015 林祺凱

SDAR protocol characteristics

Non-source-based routing No source control over route length Resilience against path hijacking

Page 17: 984403015 林祺凱

ConclusionConclusion

1717

Advantages • Use the Onion Routing approach and

trust management system • Provide trust and anonymity for the path

discovery• Enhance the shortcomings for [14] , [17]

and [19]

Page 18: 984403015 林祺凱

Thanks for your attention!

Email: Email: [email protected]@axp1.csie.ncu.edu.tw