saodv and distributed key management

20
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani

Upload: jayden

Post on 11-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

SAODV and Distributed Key Management. Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani. Agenda. SAODV AODV Authentication and Integrity Distributed Key Management Overview Advantages Disadvantages. AODV. Ad-Hoc On-Demand Distance Vector Routing Reactive route discovery - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SAODV and Distributed Key Management

SAODV and Distributed Key Management

Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani

Page 2: SAODV and Distributed Key Management

Agenda SAODV

AODV Authentication and Integrity

Distributed Key Management Overview Advantages Disadvantages

Page 3: SAODV and Distributed Key Management

AODV Ad-Hoc On-Demand Distance Vector

Routing Reactive route discovery Contains no security (no authentication

of source nodes, no data integrity checking)

Page 4: SAODV and Distributed Key Management

AODV RREQ, RREP, RERR Each node maintains a routing table of

destination nodes Each node uses sequence numbers to

check ‘freshness’ of routes

Page 5: SAODV and Distributed Key Management

AODV

Page 6: SAODV and Distributed Key Management

SAODV Secure Ad-Hoc On-Demand Distance

Vector Routing Authentication

- must verify source node’s identity Data integrity

- information passed through routing packets must not be tampered with

Page 7: SAODV and Distributed Key Management

Authentication Digital signatures (asymmetric, one

public and private key per node) No specific key distribution system Possibility of certificates

Page 8: SAODV and Distributed Key Management

Integrity Mutable (hop count) vs. immutable

(source and destination IP addresses) information

Use Hash Chains to help secure the hop count

Digital Signatures prevent tampering of immutable data

Page 9: SAODV and Distributed Key Management

Issues High cost of using digital signatures Nothing to prevent some kinds of

tampering of the hop count No exact key distribution system Man in the middle and tunneling attacks

not prevented No mention of how to secure the

process of joining group

Page 10: SAODV and Distributed Key Management

Distributed Key Mangement Simple and Fault-Tolerant Key

Agreement for Dynamic Collaborative Groups

Page 11: SAODV and Distributed Key Management

Overview Efficient Key Management required to

provide secure and reliable group communication

Problem domain Dynamic Membership Distributed and Collaborative System

Page 12: SAODV and Distributed Key Management

Key Management Solution Group Diffie-Hellman

Secured Key exchanged between nodes Key Tree

Efficient Key calculation

Page 13: SAODV and Distributed Key Management

Key Trees Efficiency

Tree Balancing Private and Public (blinded) Keys

Page 14: SAODV and Distributed Key Management

Communication Group Key Agreement View Synchrony

Guarantees group members receive same set of messages

Sender’s requested message order preserved

Page 15: SAODV and Distributed Key Management

Group Membership Events JOIN LEAVE MERGE PARTITION

Page 16: SAODV and Distributed Key Management

JOIN Role of sponsor

Page 17: SAODV and Distributed Key Management

Cascaded Events Event A occurs, and during its

processing event B occurs. This is handled using re-entrance. Partially mitigated by VS usage

Page 18: SAODV and Distributed Key Management

Security Cryptographic Requirements

Group Key Secrecy Forward Secrecy Backward Secrecy Key Independence

Page 19: SAODV and Distributed Key Management

Security cont. Security features of the protocol

Each node contributes to group key Node’s shares are secret Group membership fluctuation handled All messages are signed by senders

Page 20: SAODV and Distributed Key Management

Complexity Broadcast Tree Calculation