trust based clustering for group trust based clustering
play

Trust based Clustering for Group Trust based Clustering for Group - PowerPoint PPT Presentation

Trust based Clustering for Group Trust based Clustering for Group Trust based Clustering for Group Trust based Clustering for Group Key Management Key Management Key Management Key Management Hamida SEBA Graphs, Algorithms and Applications


  1. Trust based Clustering for Group Trust based Clustering for Group Trust based Clustering for Group Trust based Clustering for Group Key Management Key Management Key Management Key Management Hamida SEBA Graphs, Algorithms and Applications L aboratoire d' I nfoRmatique en I mage et S ystèmes d'information LIRIS UMR 5205 CNRS/INSA de Lyon/Université Claude Bernard Lyon 1/Université Lumière Lyon 2/Ecole Centrale de Lyon http://liris.cnrs.fr

  2. In this talk: In this talk:  Group based applications  Security of Group communication  Group key management  Trust based clustering for group key management 2 Hamida SEBA

  3.  Process Group based applications Group based applications  Web service  Agent  End user application  Etc.  Teleconferencing  Distributed interactive simulation  Collaborative work  E-learning  Replicated databases  Etc. Hamida SEBA 3

  4. Security of Group Communication Security of Group Communication Confidentiality Authentication Prevention Integrity Non-repudiation 4 Hamida SEBA

  5. Confidentiality Confidentiality- Key Management Key Management  Solution= Encryption  Symmetric Key : shared between the sender and the receivers.  This key is called : the group key Main issue : how to compute and distribute keys? Hamida SEBA 5

  6. GROUP KEY MANAGEMENT GROUP KEY MANAGEMENT  GROUP KEY: a secret quantity known only to current group members A new group member can not read data exchanged before he joins the group  BACKWARD SECRECY  Any subset of group keys cannot be used to discover previous group An excluded member can keys not read data exchanged after he leaves the group  FORWARD SECRECY  Any subset of group keys cannot be used to discover subsequent keys  THE GROUP KEY MANAGEMENT PROTOCOL MUST UPDATE THE GROUP KEY (REKEY) Hamida SEBA 6

  7. MODELS OF GROUP KEYS (1) MODELS OF GROUP KEYS (1)  GROUP KEY DISTRIBUTION  One party generates a secret key and distributes it to others Pairwise model Hierarchical model (tree of members or third parties Group member Group member Key node No key generation Does key generation Hamida SEBA

  8. MODELS OF GROUP KEYS (2) MODELS OF GROUP KEYS (2)  GROUP KEY AGREEMENT  Secret key is derived jointly by two or more parties  Key is a function of information contributed by each member  No party can pre-determine the result Distributed Tree of keys (maintained by each member) Group member Does key generation No pre-determined structure Key node Hamida SEBA

  9. Group Key computation: an example Protocole de Perrig et al.,2000  N 1 N 2 N 3 N 4 g g clé g mod p 1  3  N N N N 1 2 3 4 k g mod p k g mod p , 2 , 4  bk N bk i b N g mod p 1 , 2 3 , 4 i N 2 N 1 N 4 N 3 bN bN 3 4 bN bN 1 M 2 2 M 1 M 4 M 3 Hamida SEBA 9

  10. MODELS OF GROUP KEYS (3) MODELS OF GROUP KEYS (3)  Hybrid Solutions  Cluster based. Key Agreement Key Distribution  How to construct/maintain clusters?  How to compute inter-cluster keys and intra-cluster keys? How about a security based clustering? Group member Does key generation Simple node Hamida SEBA

  11. Trust Trust-based Clustering based Clustering Know each other: Establish trust/distrust relations  Log and analyze interactions  Give scores Good interaction Bad interaction Application dependent Peer to peer network: Nodes: promiscuous mode Forward packet: + Black hole attack: - Recommendations, etc. Hamida SEBA 11

  12. Trust Trust-based Clustering based Clustering j  Two trust thresholds : S max and S min tv(j,i) [1, S min S max ,1] tv(i,l) tv(i,j)  i Total trust (TT) l tv(l,i) tv(i,k) ) Є Є [S max • tv( tv(i,j i,j) and tv( ) and tv(j,i j,i) max ,1] ,1] tv(k,i) k  Partiel Trust (PT) ) Є Є [S max ) Є Є [S min • tv( tv(i,j i,j) max ,1] and ,1] and tv( tv(j,i j,i) min , , S max max ] ) Є Є [S min ) Є Є [S max • tv( tv(i,j i,j) min , , S max max ] and ] and tv( tv(j,i j,i) max ,1] ,1] ) Є Є [S min • tv( tv(i,j i,j) ) and and tv( tv(j,i j,i) min , , S max max ]  Distrust (DT) ) Є Є [-1, • tv( tv(i,j i,j) ) and and tv( tv(j,i j,i) 1, S min min ] 12 Hamida SEBA

  13. Trust Trust-based Clustering based Clustering  Two trust thresholds : S max and S min j TT  Total trust (TT) DT i l ) Є Є [S max • tv( tv(i,j i,j) and tv( ) and tv(j,i j,i) max ,1] ,1] PT k  Partiel Trust (PT) ) Є Є [S max ) Є Є [S min • tv( tv(i,j i,j) max ,1] and ,1] and tv( tv(j,i j,i) min , , S max max ] ) Є Є [S min ) Є Є [S max • tv( tv(i,j i,j) min , , S max max ] and ] and tv( tv(j,i j,i) max ,1] ,1] ) Є Є [S min • tv( tv(i,j i,j) ) and and tv( tv(j,i j,i) min , , S max max ]  Distrust (DT) ) Є Є [-1, • tv( tv(i,j i,j) ) and and tv( tv(j,i j,i) 1, S min min ] 13 Hamida SEBA 13

  14. Trust-based Clustering Trust based Clustering Distrusted node Cluster periphery (key distribution zone) Cluster core (TT) (key agreement zone) Clusterheads Max number of Self-stabilizing algorithm: TT relations  Adaptive  Self-maintaining Hamida SEBA

  15. Example Example 1 1 1 1 3 3 1 1 1 1 1 3 3 3 3 2 2 1 1 2 3 3 2 2 1 2 2 1 Hamida SEBA 15 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend