Secure Multi-Hop Infrastructure Access
presented by Reza Curtmola
(joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens)
Secure Multi-Hop Infrastructure Access presented by Reza Curtmola - - PowerPoint PPT Presentation
Secure Multi-Hop Infrastructure Access presented by Reza Curtmola (joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens) 600.647 Advanced Topics in Wireless Networks Wireless Infrastructure Access Few pure wireless peer
(joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens)
Gateway Authorized Node Adversary Revoked Node
Gateway Authorized Node Adversary Revoked Node
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 3 2
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 3 2
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 3 2 1
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 3 2 1
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 2 1.1 3
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 3 2 1.1 1
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 2 3
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 2 1 2 3 1
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 2 1 2 3 1.1 …
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 2 1 2 3 3.1
Gateway
1 1 2 2 1 1 2 2 2 2 3 2 3 3 2 3 3.1
1 3 6
1 3 2 7 6 5 4 15 14 13 12 11 10 9 8
U1 U2 U3 U4 U5 U6 U7 U8 12 2 7
– Linux Kernel Module with 2.4 and 2.6 compatibility
– Pulse Protocol
– 50 Nodes deployed across JHU Campus
– Security – (NDSS Workshop 2005)
– Leader Election Algorithm
– Efficient Tree Flooding