Each has an onboard 512-bit SHA-1 engine that can
compute 160-bit MACs in less than 0.0005 seconds
as compared to 0.5 seconds for a typical microcon-
troller. iButton can be interfaced with a host system
via serial/parallel port or USB. Our protocol has been
tested with iButton. Mobility of the nodes was also
emulated and multihop routing scenarios were evalu-
ated against performance and energy cost. However,
iButton does not realize the function F
2
but indicates
that the TPH described in the protocol can be devel-
oped at a much cheaper cost. We have completed the
design of the required TPH and are in the process of
testing it on an FPGA board.
6 DISCUSSIONS
To sum up, it can be seen that UGSP is resilient to all
attacks on an ad-hoc network forming a DUG men-
tioned earlier. UGSP is based on mutual authentica-
tion rather than only the client authenticating to the
server, or only the sender authenticating to the re-
ceiver. Our protocol provides dual security since we
are using a TPH token and access code for using the
TPH. Thus, even if the configured hardware token is
stolen or compromised, an attacker cannot use the to-
ken without knowing the valid hardware access code.
In a sense, it achieves security using the paradigm of
“Something you know, and something you get” pro-
viding dual security to the network. This concept is
similar to the one used by banks for cash dispensation
at ATM’s (a combination of card and PIN is required
to access the account).
Based upon our experience of using the prototype, we
have found that implementation of UGSP can be done
in cost-effective way. UGSP is scalable and robust to
addition of new members in the User Group. In this
paper we have demonstrated and discussed UGSP for
data transfer in a User Group in mobile ad-hoc net-
work. However, there are certain generalizations pos-
sible as stated follows:
Communication Protocol Independent: Using
UGSP, we are able to establish a secure communi-
cation channel between nodes at the end of Phase 1.
Once this happens, we can use any of the existing pro-
tocols, such as TESLA, for data communication.
Multiple Applications: Although, we have chosen
data transfer as a sample application for the demon-
stration of the protocol, UGSP can be used for several
purposes like authenticated routing, node-to-node key
agreement and ubiquitous computing.
Network Infrastructure Independent: UGSP has
been developed for mobile ad-hoc networks, but it
is equally efficient in wired networks as well. It re-
places PKI in the sense that there is no need to go to
the trusted third party everytime you want to validate
any certificate.
Membership to Multiple DUG: The TPH token can
be made to have more than one location for storing
the GAC. A node can thus be a valid user in more
than one different ad-hoc networks simultaneously.
iButton, for example, has eight locations for stor-
ing GAC. We are evaluating the system performance
when a node is a part of eight simultaneous ad-hoc
networks.
REFERENCES
Bobba, R. B., Eschenauer, L., Gligor, V., and Arbaugh,
W. A. (2002). Bootstrapping security associations for
routing in mobile ad-hoc networks. In Technical Re-
port, Institute for Systems and Research, UMD, TR
2002-44.
Hu, Y., Johnson, D., and Perrig, A. (2002). Sead: Secure
efficient distance vector routing for mobile wireless
ad hoc networks. In Workshop on Mobile Computing
Systems and Applications, IEEE.
Hu, Y.-C. and Perrig, A. (2002). Ariadne: A secure on-
demand routing protocol for ad hoc networks. In Mo-
bicom.
Khaili, A. and Arbaugh, W. A. (2002). Se-
curity of wireless ad hoc networks. In
http://www.cs.umd.edu/ aram/wireless/survey.pdf.
Khalili, A. and Arbaugh, W. (2003). Toward secure key dis-
tribution in truly ad-hoc networks. In IEEE Workshop
on Security and Assurance in Ad-Hoc Networks.
Lamport, L. (1981). Password authentication with insecure
communication. In Communications of the ACM, pg.
770-771, Number 81, Volume 24.
Papadimitratos, P. and Haas, Z. (2002). Secure routing
for mobile adhoc networks. In Communication Net-
works and Distributed Systems Modeling and Simula-
tion Conference.
Perrig, A., Canetti, R., Tygar, J., and Song, D. (2002a). The
tesla broadcast authentication protocol. In RSA Cryp-
tobytes.
Perrig, A., Szewczyk, R., Tygar, J., Wen, V., and Culler,
D. E. (2002b). Spins: Security protocols for sensor
networks. In Wireless Network Journal (WINE).
Royer, E. M. and Toh, C. K. (1999). A review of current
routing protocols for ad hoc mobile wireless networks.
In IEEE Personal communications.
Stajano, F. and Anderson, R. (1999). The resurrecting duck-
ling: Security issues for ad-hoc wireless networks. In
Proceedings of the 3rd AT & T Software Symposium.
Toh, C. K. (2001). Maximum battery life routing to sup-
port ubiquitous mobile computing in wireless ad hoc
networks. In IEEE Communications Magazine.
Zhou, L. and Haas, Z. (1999). Securing ad hoc networks.
In IEEE Network Magazine, 13(6).
ICETE 2004 - WIRELESS COMMUNICATION SYSTEMS AND NETWORKS
196