SlideShare a Scribd company logo
Key management in ad hoc networks
Presenter : saleh abu rahmah
Supervisor: Dr. iman almomani
Ad hoc network
Is a wireless network. It is on flay with no
Infrastructure, all nodes are peers.
Ad hoc advantages
- easy to deploy.
- Many devices such as PDA, Mobile,
Laptop can benefit such networks
Challenges
- implement the network services
Layer wired Ad hoc
Media
Access
CSMA/CD MACA MACAW
Network Proactive protocols:
DV (Rip),
LS (OSPF).
Reactive protocols:
AODVP,
DSR
Transport TCP TCP over wireless
- Security: it's not easy to implement a centralized CA. Any node can join the
network.
RREQ
RREQ
AODV
A
B
C
D
E
F
RREQ
It is A reactive routing protocol used in ad hoc networks.
What is the difference between the proactive and reactive routing
Protocols?
Novel secure and authenticated key distribution protocol
The NSAUKDP provide symmetric key distribution between the source and
Destination, and any two adjacent nodes in the path.
S A B D
Ksd
Ksa
Kab
Ksa
Kab
Kbd
Ksd
Ksb
The protocol uses five phases
1- initialization
2- Route Request phase.
3- Key Setup phase.
4- Authentication phase.
5- Communication phase
The initialization phase
The node have to register itself to a CA before being
deployed in the Network as follow.
A->T : IDA
, KA+
T-> : [IPA
,KA+
]KCA-
,KCA+
S
A
D
Route Request key setup And authentication phase:
HNS=H(NS
)
PacketS=[IPS
,KCS-
]KS-
,KS+
SREQ=broadcast[IDD
, IDS
,PacketS,HNS]
B
PacketA=,[PacketS, IPA
,KCA-
]KA-
,KA+
SREQ=broadcast[IDD
, IDA
,PacketA,HNS]
PacketB=,[PacketS, IPB
,KCB-
]KB-
,KB+
SREQ=broadcast[IDD
, IDB
,PacketB,HNS]
S
A
B
KSD
,KBD
PacketD=[KSD
]KS+
,[KBD
]KB+
,H[KSD
:HNS]
DREP=IDS,PacketD,H[KBD
]
KAB
PacketB=[KSD
]KS+
,[KAB
]KA+
,H[KSD
:HNS]
DREP=IDS,PacketB,H[KAB
]
KAS
PacketB=[KSD
]KS+
,[KSA
]KS+
,H[KSD
:HNS]
DREP=IDS,PacketA,H[KSA
]
S
A
B
D
Ksd
Ksa
Kab
Kbd
Ksd
Kbd
Kab
Ksa
Esa
(Esd
(M))
Dsa
(cipher)
Eab
(Esd
(M))
Dab
(cipher)
Ebd
(Esd
(M))
Dbd
(Dsd
(cipher))
Communication phase

More Related Content

What's hot

Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
samis
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
Rishabh Dangwal
 
vlan
vlanvlan
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
Lilesh Pathe
 
Vlan
VlanVlan
Vlan
Vlan Vlan
Vlan
sanss40
 
Advantages of VLAN
Advantages of VLANAdvantages of VLAN
Advantages of VLAN
NetProtocol Xpert
 
Chapter 14 : vlan
Chapter 14 : vlanChapter 14 : vlan
Chapter 14 : vlan
teknetir
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
IT Tech
 
Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)
Mohammad Javad Abdolmaleki
 
Vlan
VlanVlan
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
 
vlan
vlanvlan
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routing
Mohammedseleim
 
VLAN
VLANVLAN
Vlan final
Vlan finalVlan final
Vlan final
Veena Rao
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
Netwax Lab
 
VLAN Network for Extreme Networks
VLAN Network for Extreme NetworksVLAN Network for Extreme Networks
VLAN Network for Extreme Networks
Dani Royman Simanjuntak
 

What's hot (19)

Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
vlan
vlanvlan
vlan
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Vlan
VlanVlan
Vlan
 
Vlan
Vlan Vlan
Vlan
 
Advantages of VLAN
Advantages of VLANAdvantages of VLAN
Advantages of VLAN
 
Chapter 14 : vlan
Chapter 14 : vlanChapter 14 : vlan
Chapter 14 : vlan
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 
Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)
 
Vlan
VlanVlan
Vlan
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
vlan
vlanvlan
vlan
 
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routing
 
VLAN
VLANVLAN
VLAN
 
Vlan final
Vlan finalVlan final
Vlan final
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
 
VLAN Network for Extreme Networks
VLAN Network for Extreme NetworksVLAN Network for Extreme Networks
VLAN Network for Extreme Networks
 

Viewers also liked

My tech timeline
My tech timelineMy tech timeline
My tech timeline
prettygirljones23
 
Tecnología de Punta
Tecnología de PuntaTecnología de Punta
Tecnología de Punta
Sol Carolina
 
Website Heal Thyself
Website Heal ThyselfWebsite Heal Thyself
Website Heal Thyself
moralesufl
 
Adjoin Meetings Profile
Adjoin Meetings ProfileAdjoin Meetings Profile
Adjoin Meetings Profile
Adjoin Meetings
 
Trinity motors, INC.
Trinity motors, INC.Trinity motors, INC.
Trinity motors, INC.
Jim Sharp
 
Seminar apr 2013
Seminar apr 2013Seminar apr 2013
Seminar apr 2013
ETRLaboratories
 
งานแผนการสอน (2)
งานแผนการสอน (2)งานแผนการสอน (2)
งานแผนการสอน (2)
Chutkamon Dachrueang
 
Technologies
TechnologiesTechnologies
Technologies
chelseanicole61
 
20131023 slide share-radon_water
20131023 slide share-radon_water20131023 slide share-radon_water
20131023 slide share-radon_water
ETRLaboratories
 
Frog powerpoint
Frog powerpointFrog powerpoint
Frog powerpoint
Saoirse Ryan
 
Ad hoc symatric key destribution
Ad hoc symatric key destributionAd hoc symatric key destribution
Ad hoc symatric key destribution
salehsl
 
Aines 2013
Aines 2013Aines 2013
Pig in the pond
Pig in the pondPig in the pond
Pig in the pond
Saoirse Ryan
 
Chickens life cycle
Chickens life cycleChickens life cycle
Chickens life cycle
Saoirse Ryan
 
Web technology practical list
Web technology practical listWeb technology practical list
Web technology practical list
desaipratu10
 

Viewers also liked (15)

My tech timeline
My tech timelineMy tech timeline
My tech timeline
 
Tecnología de Punta
Tecnología de PuntaTecnología de Punta
Tecnología de Punta
 
Website Heal Thyself
Website Heal ThyselfWebsite Heal Thyself
Website Heal Thyself
 
Adjoin Meetings Profile
Adjoin Meetings ProfileAdjoin Meetings Profile
Adjoin Meetings Profile
 
Trinity motors, INC.
Trinity motors, INC.Trinity motors, INC.
Trinity motors, INC.
 
Seminar apr 2013
Seminar apr 2013Seminar apr 2013
Seminar apr 2013
 
งานแผนการสอน (2)
งานแผนการสอน (2)งานแผนการสอน (2)
งานแผนการสอน (2)
 
Technologies
TechnologiesTechnologies
Technologies
 
20131023 slide share-radon_water
20131023 slide share-radon_water20131023 slide share-radon_water
20131023 slide share-radon_water
 
Frog powerpoint
Frog powerpointFrog powerpoint
Frog powerpoint
 
Ad hoc symatric key destribution
Ad hoc symatric key destributionAd hoc symatric key destribution
Ad hoc symatric key destribution
 
Aines 2013
Aines 2013Aines 2013
Aines 2013
 
Pig in the pond
Pig in the pondPig in the pond
Pig in the pond
 
Chickens life cycle
Chickens life cycleChickens life cycle
Chickens life cycle
 
Web technology practical list
Web technology practical listWeb technology practical list
Web technology practical list
 

Similar to Pres

CCNA 1
CCNA 1CCNA 1
CCNA 1
Asish Verma
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
journal ijrtem
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
imec.archive
 
CisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsecCisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsec
AreaNetworking.it
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
Kristof De Brouwer
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
phanleson
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSPERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
JYoTHiSH o.s
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
shajeeha khalid
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
Ezxprt
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
Nicolai van der Smagt
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
BRNSSPublicationHubI
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
Manet ppt
Manet pptManet ppt
Manet ppt
sandeep Kaur
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
skobu
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
IJERA Editor
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
IJMER
 

Similar to Pres (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
 
CisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsecCisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsec
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSPERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Pres

  • 1. Key management in ad hoc networks Presenter : saleh abu rahmah Supervisor: Dr. iman almomani
  • 2. Ad hoc network Is a wireless network. It is on flay with no Infrastructure, all nodes are peers. Ad hoc advantages - easy to deploy. - Many devices such as PDA, Mobile, Laptop can benefit such networks Challenges - implement the network services Layer wired Ad hoc Media Access CSMA/CD MACA MACAW Network Proactive protocols: DV (Rip), LS (OSPF). Reactive protocols: AODVP, DSR Transport TCP TCP over wireless - Security: it's not easy to implement a centralized CA. Any node can join the network.
  • 3. RREQ RREQ AODV A B C D E F RREQ It is A reactive routing protocol used in ad hoc networks. What is the difference between the proactive and reactive routing Protocols?
  • 4. Novel secure and authenticated key distribution protocol The NSAUKDP provide symmetric key distribution between the source and Destination, and any two adjacent nodes in the path. S A B D Ksd Ksa Kab Ksa Kab Kbd Ksd Ksb The protocol uses five phases 1- initialization 2- Route Request phase. 3- Key Setup phase. 4- Authentication phase. 5- Communication phase
  • 5. The initialization phase The node have to register itself to a CA before being deployed in the Network as follow. A->T : IDA , KA+ T-> : [IPA ,KA+ ]KCA- ,KCA+
  • 6. S A D Route Request key setup And authentication phase: HNS=H(NS ) PacketS=[IPS ,KCS- ]KS- ,KS+ SREQ=broadcast[IDD , IDS ,PacketS,HNS] B PacketA=,[PacketS, IPA ,KCA- ]KA- ,KA+ SREQ=broadcast[IDD , IDA ,PacketA,HNS] PacketB=,[PacketS, IPB ,KCB- ]KB- ,KB+ SREQ=broadcast[IDD , IDB ,PacketB,HNS] S A B KSD ,KBD PacketD=[KSD ]KS+ ,[KBD ]KB+ ,H[KSD :HNS] DREP=IDS,PacketD,H[KBD ] KAB PacketB=[KSD ]KS+ ,[KAB ]KA+ ,H[KSD :HNS] DREP=IDS,PacketB,H[KAB ] KAS PacketB=[KSD ]KS+ ,[KSA ]KS+ ,H[KSD :HNS] DREP=IDS,PacketA,H[KSA ]