quest 01

Upload: muhammad-ibrahim-marwat

Post on 05-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Quest 01

    1/10

    The Quest for Security in Mobile Ad Hoc Networks

    Jean-Pierre HubauxInstitute for ComputerCommunications and

    ApplicationsSwiss Federal Institute ofTechnology Lausanne

    CH-1015, Switzerland

    Levente ButtyanInstitute for ComputerCommunications and

    ApplicationsSwiss Federal Institute ofTechnology Lausanne

    CH-1015, Switzerland

    Srdan CapkunInstitute for ComputerCommunications and

    ApplicationsSwiss Federal Institute ofTechnology Lausanne

    CH-1015, Switzerland

    ABSTRACT

    1. INTRODUCTION

  • 7/31/2019 Quest 01

    2/10

    2. THREATS

    2.1 Vulnerabilities of the basic mechanisms

    2.2 Vulnerabilities of the security mechanisms

    3. PROTECTION OF THE BASIC MECHA-

    NISMS

    3.1 Tamper resistance

  • 7/31/2019 Quest 01

    3/10

    3.2 Routing-based mechanisms

    3.3 Neighborhood

    3.4 Service enforcement

  • 7/31/2019 Quest 01

    4/10

    5

    4

    1700

    695

    97

    98

    681

    684

    R1

    R2

    source

    destination

    packet with packet pursecontaining 4 nuglets

    node purse

    before and after

    packet transfer

    4

    681

    684

    4. PROTECTING THE SECURITY MECH-

    ANISMS

  • 7/31/2019 Quest 01

    5/10

    4.1 Emulation of a certification authority

    4.2 Key agreement

    5. SELF-ORGANIZED PUBLIC-KEY

    INFRASTRUCTURE

  • 7/31/2019 Quest 01

    6/10

    5.1 Model and framework

    uv

    subgraph ofu

    subgraph ofv

    path fromu tov

  • 7/31/2019 Quest 01

    7/10

    5.2 The Shortcut Hunter algorithm

    5.3 Evaluation of Shortcut Hunter

  • 7/31/2019 Quest 01

    8/10

    5.4 Dishonest users

  • 7/31/2019 Quest 01

    9/10

    6. CONCLUSION

  • 7/31/2019 Quest 01

    10/10

    7. ACKNOWLEDGEMENTS

    8. REFERENCES