quest 01
TRANSCRIPT
-
7/31/2019 Quest 01
1/10
The Quest for Security in Mobile Ad Hoc Networks
Jean-Pierre HubauxInstitute for ComputerCommunications and
ApplicationsSwiss Federal Institute ofTechnology Lausanne
CH-1015, Switzerland
Levente ButtyanInstitute for ComputerCommunications and
ApplicationsSwiss Federal Institute ofTechnology Lausanne
CH-1015, Switzerland
Srdan CapkunInstitute for ComputerCommunications and
ApplicationsSwiss Federal Institute ofTechnology Lausanne
CH-1015, Switzerland
ABSTRACT
1. INTRODUCTION
-
7/31/2019 Quest 01
2/10
2. THREATS
2.1 Vulnerabilities of the basic mechanisms
2.2 Vulnerabilities of the security mechanisms
3. PROTECTION OF THE BASIC MECHA-
NISMS
3.1 Tamper resistance
-
7/31/2019 Quest 01
3/10
3.2 Routing-based mechanisms
3.3 Neighborhood
3.4 Service enforcement
-
7/31/2019 Quest 01
4/10
5
4
1700
695
97
98
681
684
R1
R2
source
destination
packet with packet pursecontaining 4 nuglets
node purse
before and after
packet transfer
4
681
684
4. PROTECTING THE SECURITY MECH-
ANISMS
-
7/31/2019 Quest 01
5/10
4.1 Emulation of a certification authority
4.2 Key agreement
5. SELF-ORGANIZED PUBLIC-KEY
INFRASTRUCTURE
-
7/31/2019 Quest 01
6/10
5.1 Model and framework
uv
subgraph ofu
subgraph ofv
path fromu tov
-
7/31/2019 Quest 01
7/10
5.2 The Shortcut Hunter algorithm
5.3 Evaluation of Shortcut Hunter
-
7/31/2019 Quest 01
8/10
5.4 Dishonest users
-
7/31/2019 Quest 01
9/10
6. CONCLUSION
-
7/31/2019 Quest 01
10/10
7. ACKNOWLEDGEMENTS
8. REFERENCES