Unlocking the Potential of the Cloud for IBM Power Systems
Securing MANETs through mobility clustering and threshold crypto
1. Securing Mobile Ad Hoc
Networks through Mobility
based Clustering and Threshold
Cryptography
By
A.Prem kumar
2. What is MANET?
Mobile Ad-Hoc network (MANET) is one
where there is no fixed infrastructure such as
base stations or mobile switching centers.
3. Why it is for ?
characteristics of Mobile Ad Hoc networks (MANETs)
pose a number of non-trivial challenges to security design.
4. Stages of the algorithm
1. Discovery Stage
2. Merging Stage
3. Maintaining Stage
5. INTRODUCTION
1. Cluster formation
2. Each cluster Initiates a merging process
The threshold security technique uses the (n,p)
threshold scheme where some secret data D is
divided into n pieces D1,D2,…..Dn in such a
way that:
1. Knowledge of any p or more Di pieces makes
D easily
computable.
2. Knowledge of any (p-1) or fewer Di pieces
makes D
completely undetermined
6. 1.EACH NODE CALCULATES IT’S
LOCAL STABILITY VALUE.
2.IF IT’S LESS, THAT ASSUMES
STATES OF CLUSTER HEAD
1.Discovery Stage
7. 2.MERGING STAGE
There are two cases that may initiate a
merging process:
1. A non-clustered node requests to join
the neighboring clusters.
2. Two neighboring gateways request to
merge their clusters.
8. 3.MAINTAINING STAGE
We first consider two cases that may cause
topology
changes in MANET and thus invoke cluster
maintenancestage:
1. A node switches on and joins the network.
2. A node switches off and leaves the network
9. KEY MANAGEMENT SERVICE
1.Efficient secret key schemes are used to
secure further communication after nodes
authenticate each other and establish a shared
secret session key.
2.In a public key infrastructure, each node has
a
public/private key pair. Public keys can be
distributed to other nodes, while private keys
should be kept confidential to individual nodes.
12. THRESHOLD CRYPTOGRAPHY
An (n, p) threshold cryptography scheme allows
n parties to share the ability to perform a
cryptographic operation (e.g., creating a digital
signature), so that any p parties can perform
this operation jointly, whereas it is infeasible for
at most (p-1) parties to do so, even by
collusion.
14. CONCLUSION
1.The idea of using the threshold cryptography
combined with mobility based clustering is
worth examining further to establish its full
potential.
2.To build a highly available and secure key
management service, we propose to use
threshold cryptography to distributed trust
among a set of servers.