984403015 林祺凱
TRANSCRIPT
An efficient secure distributed An efficient secure distributed anonymous routing protocol for anonymous routing protocol for
mobile and wireless ad hoc networksmobile and wireless ad hoc networks
Azzedine Boukerchea,b, Khalil El-Khatiba, Li Xua and Larry Korbab,
Computer Communications, Vol. 28, No. 10., pp. 1193-1203, 16 June 2005.
Presenter: Presenter: Chi-Kai LinChi-Kai LinEmail: [email protected]: [email protected]
1
OutlineOutline Introduction Previous and related work A secure distributed anonymous routing proto
col (SDAR)• Path discovery phase• Path reverse phase• Data transfer phase
SDAR protocol characteristics Security analysis Conclusion
22
Introduction
Mobile Ad hoc Network
(MANET)
Previous and related work (1/2) Papadimitratos and Haas [14]
• proposed Secure Routing Protocol (SRP) based on DSR[15,16]
Dahill [17] • proposed the Authenticated Routing for Ad hoc
Networks (ARAN)• uses public key cryptography instead of the
shared security association Venkatraman and Agrawal [19]
• proposed an approach for enhancing the security of AODV protocol [20]
• based on public key cryptography
Previous and related work (2/2)
Shortcomings • only ensure the authenticity but not the
privacy of the routing information• middle nodes in the routing path can
easily find the identity of the communicating nodes
SDAR: An efficient secure distributed anonymous routing protocol
for mobile and wireless ad hoc networks
66
1. Path discovery phase (1/2)
77
S
R2
1
3
Path Discovery
S’s MSG
1. Path discovery phase (2/2)
88
S
R2
1
3
S’s MSG
S’s MSGS’s MSG
2. Path reverse phase (1/3)
99
S
R2
1
3
R’s Msg
2. Path reverse phase (2/3)
1010
S
R2
1
3
R’s Msg
2. Path reverse phase (3/3)
1111
S
R2
1
3R’s Msg
R’s Msg
3. Data transfer phase (1/4)
1212
DataData
S
R2
1
3
KKRR((DataData))
KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))
3. Data transfer phase (2/4)
1313
DataData
S
R2
1
3
KKRR((DataData))
KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))
3. Data transfer phase (3/4)
1414
S
R2
1
3
KK22((KKRR((DataData))))
3. Data transfer phase (4/4)
1515
S
R2
1
3
KKRR((DataData))
SDAR protocol characteristics
Non-source-based routing No source control over route length Resilience against path hijacking
ConclusionConclusion
1717
Advantages • Use the Onion Routing approach and
trust management system • Provide trust and anonymity for the path
discovery• Enhance the shortcomings for [14] , [17]
and [19]
Thanks for your attention!
Email: Email: [email protected]@axp1.csie.ncu.edu.tw