Talking To Strangers: Authentication in AdHoc Wireless Networks - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Talking To Strangers: Authentication in AdHoc Wireless Networks

Description:

Securely and Authentically Communication with any ad-hoc device. Certificate ... Resurrecting Duckling Security Model - Master/Slave (Mother/Duckling) 8/8/09 ... – PowerPoint PPT presentation

Number of Views:75
Avg rating:3.0/5.0
Slides: 19
Provided by: discover
Category:

less

Transcript and Presenter's Notes

Title: Talking To Strangers: Authentication in AdHoc Wireless Networks


1
Talking To StrangersAuthentication in Ad-Hoc
Wireless Networks
  • Presenter Phu Dinh

2
Outline
  • Introduction
  • Related Works
  • Preliminaries
  • Basic Protocol
  • Alternative Protocols
  • Group Key Exchange Protocols
  • Conclusion and Future Work

3
Introduction
  • Problem
  • - Securely and Authentically Communication
    with any ad-hoc device
  • Certificate Authority?
  • - Public Key Infrastructure Impractical
    Expensive
  • - Finding the Device Name Not Reliable
  • - Universal Naming Scheme Not User-Friendly

4
Related Work
  • Out-of-Band Authentication
  • - Phone, Mail, Face-to-Face
  • Bluetooth and WEP
  • - PIN and Link Layer Security
  • Resurrecting Duckling Security Model
  • - Master/Slave (Mother/Duckling)

5
Preliminaries
  • Location-Limited Channels
  • Used for Pre-Authentication
  • Properties
  • - Support Demonstrative Identification
  • . Based on Physical Context
  • - Authenticity
  • . Protect from Potential Active Attackers
  • - No Secrecy
  • . Resistant to Passive Attackers
  • Physical Media
  • Contact, Infrared, Sound, etc.

6
Preliminaries contd
  • Public Key Cryptography
  • Remove Secrecy Requirement
  • - Secure Against Passive Attacks
  • - Active Attacks Are Easily Detected
  • Use of Hash Functions

7
Basic Protocol
  • Public Key Operations at Both Ends

8
Basic Protocol contd
  • Note
  • - Security does not rely on the correctness
    of the device address.
  • - However if provide wrong address, both
    devices cant complete the authentication process

9
Alternative Protocols
  • Single Public Key Protocol
  • - When only one of the devices has resource for
    expensive public key operation
  • Interactive Guy Fawles Protocol
  • - Public key operation are infeasible for both
    ends

10
Single Public Key
11
Interactive Guy Fawles Protocol
12
Group Key Exchange Protocols
  • Centrally Managed Groups
  • Unmanaged Groups.

13
Centrally Managed Groups
14
Centrally Managed Group contd
  • Problem
  • Since any node can become the group manager
  • - Single Point of Attack
  • - Group Manager leaves the group

15
Unmanaged Groups
16
Conclusion
  • Use of Location-Limited Channels
  • Novel Location-Limited Channels
  • Concrete Pre-Authentication Protocols
  • Group Communication
  • No Reliance on PKI

17
Future Works
  • Physical Media for Location-Limited Channels
  • Discover New Media
  • Determine Optimal Media
  • Determine Any Vulnerabilities and Fixes
  • Further Implementation Development
  • - Constructing Contact-Mediated Interface
  • - Expand to Group Authentication with Audio

18
End
  • Questions?
Write a Comment
User Comments (0)
About PowerShow.com