984403015 林祺凱

Post on 07-Aug-2015

400 Views

Category:

Education

5 Downloads

Preview:

Click to see full reader

TRANSCRIPT

An efficient secure distributed An efficient secure distributed anonymous routing protocol for anonymous routing protocol for

mobile and wireless ad hoc networksmobile and wireless ad hoc networks

Azzedine Boukerchea,b, Khalil El-Khatiba, Li Xua and Larry Korbab,

Computer Communications, Vol. 28, No. 10., pp. 1193-1203, 16 June 2005.

Presenter: Presenter: Chi-Kai LinChi-Kai LinEmail: cklin@axp1.csie.ncu.edu.twEmail: cklin@axp1.csie.ncu.edu.tw

1

OutlineOutline Introduction Previous and related work A secure distributed anonymous routing proto

col (SDAR)• Path discovery phase• Path reverse phase• Data transfer phase

SDAR protocol characteristics Security analysis Conclusion

22

Introduction

Mobile Ad hoc Network

(MANET)

Previous and related work (1/2) Papadimitratos and Haas [14]

• proposed Secure Routing Protocol (SRP) based on DSR[15,16]

Dahill [17] • proposed the Authenticated Routing for Ad hoc

Networks (ARAN)• uses public key cryptography instead of the

shared security association Venkatraman and Agrawal [19]

• proposed an approach for enhancing the security of AODV protocol [20]

• based on public key cryptography

Previous and related work (2/2)

Shortcomings • only ensure the authenticity but not the

privacy of the routing information• middle nodes in the routing path can

easily find the identity of the communicating nodes

SDAR: An efficient secure distributed anonymous routing protocol

for mobile and wireless ad hoc networks

66

1. Path discovery phase (1/2)

77

S

R2

1

3

Path Discovery

S’s MSG

1. Path discovery phase (2/2)

88

S

R2

1

3

S’s MSG

S’s MSGS’s MSG

2. Path reverse phase (1/3)

99

S

R2

1

3

R’s Msg

2. Path reverse phase (2/3)

1010

S

R2

1

3

R’s Msg

2. Path reverse phase (3/3)

1111

S

R2

1

3R’s Msg

R’s Msg

3. Data transfer phase (1/4)

1212

DataData

S

R2

1

3

KKRR((DataData))

KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))

3. Data transfer phase (2/4)

1313

DataData

S

R2

1

3

KKRR((DataData))

KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))

3. Data transfer phase (3/4)

1414

S

R2

1

3

KK22((KKRR((DataData))))

3. Data transfer phase (4/4)

1515

S

R2

1

3

KKRR((DataData))

SDAR protocol characteristics

Non-source-based routing No source control over route length Resilience against path hijacking

ConclusionConclusion

1717

Advantages • Use the Onion Routing approach and

trust management system • Provide trust and anonymity for the path

discovery• Enhance the shortcomings for [14] , [17]

and [19]

Thanks for your attention!

Email: Email: cklin@axp1.csie.ncu.edu.twcklin@axp1.csie.ncu.edu.tw

top related