Karim El Defrawy and Gene Tsudik
1 10/22/2008
IEEE-ICNP’08
Karim El Defrawy and Gene Tsudik IEEE- ICNP08 10/22/2008 1 - - PowerPoint PPT Presentation
Karim El Defrawy and Gene Tsudik IEEE- ICNP08 10/22/2008 1 Introduction Privacy and Security in MANETs Related Work Overview of Group Signatures PRISM Protocol and Operation Security Analysis and Simulations
1 10/22/2008
IEEE-ICNP’08
2 10/22/2008
IEEE-ICNP’08
Infrastructure-less Mobile Multitude of devices
May be deployed in extreme settings
3 10/22/2008
IEEE-ICNP’08
Environment is “hostile” and “suspicious”
aftermath
4 10/22/2008
IEEE-ICNP’08
Special type of MANETs Restricted mobility
High speeds Privacy is a must
5 10/22/2008
IEEE-ICNP’08
Goal:
Challenges:
6 10/22/2008
IEEE-ICNP’08
Typical security requirements:
7 10/22/2008
IEEE-ICNP’08
Secure on-demand routing protocols: Ariadne,
Privacy preserving on demand protocols: ANODR,
Long Term ID or pseudonyms Source shares information/keys with destination (ASR,ARM,ASRP,ANODR) Source knows public key of destination (SDAR) Online location/certificate servers (SPAAR, AO2P,ODAR)
8 10/22/2008
IEEE-ICNP’08
9 10/22/2008
IEEE-ICNP’08
Location-centric communication instead of
Location-centric communication more privacy-
Group signatures used to construct privacy-
PRISM is based on AODV
10 10/22/2008
IEEE-ICNP’08
Any member of a potentially large and dynamic group
GSIG can be verified by anyone who has a constant-
Valid signature
Given two GSIGs, it is computationally infeasible to
In the event of a dispute, a GSIG can be opened by
11 10/22/2008
IEEE-ICNP’08
SETUP: an algorithm run by GM:
JOIN: a protocol between GM and user resulting
SIGN: an algorithm executed by a group member:
12 10/22/2008
IEEE-ICNP’08
VERIFY: an algorithm run by anyone:
OPEN: an algorithm run by the GM:
REVOKE: an algorithm run by GM to remove
13 10/22/2008
IEEE-ICNP’08
Group Manager (GM): entity responsible for
Group Members: users/entities that represent the
Outsiders: any other user/entity external to
14 10/22/2008
IEEE-ICNP’08
[LOCATION] nodes can obtain location info
[PRIVACY] no long-term public node ID or address [MOBILITY] network is mobile but nodes are
[SECURITY]
15 10/22/2008
IEEE-ICNP’08
1.
2.
3.
10/22/2008 16
IEEE-ICNP’08
17
10/22/2008
IEEE-ICNP’08
18
10/22/2008
IEEE-ICNP’08
19
10/22/2008
IEEE-ICNP’08
20
10/22/2008
IEEE-ICNP’08
21
10/22/2008
IEEE-ICNP’08
22
10/22/2008
IEEE-ICNP’08
23
10/22/2008
IEEE-ICNP’08
Active/Passive Outsiders:
24 10/22/2008
IEEE-ICNP’08
Passive (honest-but-curious) Insider:
25 10/22/2008
IEEE-ICNP’08
Active Insiders:
26 10/22/2008
IEEE-ICNP’08
Two mobility models:
Mobility)
DST-AREA radius = 20m Area = 1000m2 Tx-Range=150m Num Nodes= 1000 50 sending sources
27 10/22/2008
IEEE-ICNP’08
One-time certificates instead of GSIG
Prevent active insiders based on location
Accommodate heterogeneous MANET devices
Evaluation with real mobility traces
28 10/22/2008
IEEE-ICNP’08
10/22/2008 29
IEEE-ICNP’08
Location-centric communication is more
Group signatures are a promising building
Several research problems remain
30 10/22/2008
IEEE-ICNP’08
31 10/22/2008
IEEE-ICNP’08
32 10/22/2008
IEEE-ICNP’08