secure communications for cluster-based ad hoc networks using node identities
DESCRIPTION
Secure communications for cluster-based ad hoc networks using node identities. Authors: Jung-San Lee and Chin-Chen Chang Sources: Journal of Network and Computer Applications, article in press Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Varadharajan et al.’s scheme - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/1.jpg)
Secure communications for cluster-based ad hoc networks
using node identities
Authors: Jung-San Lee and Chin-Chen Chang
Sources: Journal of Network and Computer Applications, article in press
Reporter: Chun-Ta Li (李俊達 )
![Page 2: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/2.jpg)
2
Outline Motivation Varadharajan et al.’s scheme The proposed scheme Comments
![Page 3: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/3.jpg)
Motivation NTDR (Near Term Digital Radio) environment
3
![Page 4: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/4.jpg)
Varadharajan et al.’s scheme Notations
4
![Page 5: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/5.jpg)
Varadharajan et al.’s scheme (cont.) Authentication phase
5
![Page 6: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/6.jpg)
Varadharajan et al.’s scheme (cont.) Communication phase (same cluster)
6
mhA mhBHID1
1. mhA, HID1, T1, N1,KHID1-mhA [mhB,KS1], SIGmhA-HID1
2. mhB, HID1, T2, N2,KHID1-mhB [mhA,mhB, KS1], SIGHID1-mhB
3. mhB, HID1, T3, N2+1,KHID1-mhB [mhA,mhB, KS2], SIGmhB-HID14. HID1, mhA, KHID1-mhA [mhA,mhB,
CERTmhB, LOC{mhB}, KS2],SIGHID1-mhA, T4, N1+1
5. CERTmhA, mhB, T5, N3, KS[M], SIGmhA-mhB
6. mhB, mhA, T6, N3+1, KS[M’], SIGmhB-mhA
KS = F(KS1, KS2)
![Page 7: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/7.jpg)
Varadharajan et al.’s scheme (cont.) Communication phase (different clusters)
7
![Page 8: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/8.jpg)
The proposed scheme Notations
8
![Page 9: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/9.jpg)
The proposed scheme (cont.) System setup
9
TA MIDi
CHIDj
![Page 10: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/10.jpg)
The proposed scheme (cont.) Authentication phase
10
KMH = (CHID2j)H(T)*Ki
AUC = H(KMH)
![Page 11: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/11.jpg)
The proposed scheme (cont.) Communication phase (same cluster and
within one hop
11
![Page 12: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/12.jpg)
The proposed scheme (cont.) Communication phase (same cluster and not
within one hop
12
![Page 13: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/13.jpg)
The proposed scheme (cont.) Communication phase (different clusters)
13
![Page 14: Secure communications for cluster-based ad hoc networks using node identities](https://reader035.vdocuments.mx/reader035/viewer/2022062809/5681572e550346895dc4cb46/html5/thumbnails/14.jpg)
14
Comments The encrypted message can be revealed by
clusterhead node The conference key (non-interactive)
K1
K2
K3
MID1
MID2
CHID1
K123 = (MID22)*(CHID1
2)H(T’)*K1
K123 = (MID12)*(MID2
2)H(T’)*K2
K123 = (MID12)*(CHID1
2)H(T’)*K3