984403015 林祺凱
TRANSCRIPT
![Page 1: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/1.jpg)
An efficient secure distributed An efficient secure distributed anonymous routing protocol for anonymous routing protocol for
mobile and wireless ad hoc networksmobile and wireless ad hoc networks
Azzedine Boukerchea,b, Khalil El-Khatiba, Li Xua and Larry Korbab,
Computer Communications, Vol. 28, No. 10., pp. 1193-1203, 16 June 2005.
Presenter: Presenter: Chi-Kai LinChi-Kai LinEmail: [email protected]: [email protected]
1
![Page 2: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/2.jpg)
OutlineOutline Introduction Previous and related work A secure distributed anonymous routing proto
col (SDAR)• Path discovery phase• Path reverse phase• Data transfer phase
SDAR protocol characteristics Security analysis Conclusion
22
![Page 3: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/3.jpg)
Introduction
Mobile Ad hoc Network
(MANET)
![Page 4: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/4.jpg)
Previous and related work (1/2) Papadimitratos and Haas [14]
• proposed Secure Routing Protocol (SRP) based on DSR[15,16]
Dahill [17] • proposed the Authenticated Routing for Ad hoc
Networks (ARAN)• uses public key cryptography instead of the
shared security association Venkatraman and Agrawal [19]
• proposed an approach for enhancing the security of AODV protocol [20]
• based on public key cryptography
![Page 5: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/5.jpg)
Previous and related work (2/2)
Shortcomings • only ensure the authenticity but not the
privacy of the routing information• middle nodes in the routing path can
easily find the identity of the communicating nodes
![Page 6: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/6.jpg)
SDAR: An efficient secure distributed anonymous routing protocol
for mobile and wireless ad hoc networks
66
![Page 7: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/7.jpg)
1. Path discovery phase (1/2)
77
S
R2
1
3
Path Discovery
S’s MSG
![Page 8: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/8.jpg)
1. Path discovery phase (2/2)
88
S
R2
1
3
S’s MSG
S’s MSGS’s MSG
![Page 9: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/9.jpg)
2. Path reverse phase (1/3)
99
S
R2
1
3
R’s Msg
![Page 10: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/10.jpg)
2. Path reverse phase (2/3)
1010
S
R2
1
3
R’s Msg
![Page 11: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/11.jpg)
2. Path reverse phase (3/3)
1111
S
R2
1
3R’s Msg
R’s Msg
![Page 12: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/12.jpg)
3. Data transfer phase (1/4)
1212
DataData
S
R2
1
3
KKRR((DataData))
KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))
![Page 13: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/13.jpg)
3. Data transfer phase (2/4)
1313
DataData
S
R2
1
3
KKRR((DataData))
KK11((KK22((KKRR((DataData))))))KK22((KKRR((DataData))))
![Page 14: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/14.jpg)
3. Data transfer phase (3/4)
1414
S
R2
1
3
KK22((KKRR((DataData))))
![Page 15: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/15.jpg)
3. Data transfer phase (4/4)
1515
S
R2
1
3
KKRR((DataData))
![Page 16: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/16.jpg)
SDAR protocol characteristics
Non-source-based routing No source control over route length Resilience against path hijacking
![Page 17: 984403015 林祺凱](https://reader033.vdocuments.mx/reader033/viewer/2022061507/55c44d3fbb61eb321b8b4644/html5/thumbnails/17.jpg)
ConclusionConclusion
1717
Advantages • Use the Onion Routing approach and
trust management system • Provide trust and anonymity for the path
discovery• Enhance the shortcomings for [14] , [17]
and [19]