Sunday, May 22, 2011

Public Key in NS2 (Cryptography)

Public Key in Ns2

HI everybody here like to brief or just info about the Public Key infrastructure (Pki). Public Key is one of the method for cryptography using digital certificates used to transfer the data safe and securely. Explains how is done in Ns2.General explanation follows

Public-key cryptography requires that entities that want to communicate in a secure manner, possess certain security credentials. This collection of security credentials is stored in a wallet. Security credentials consist of a public/private key pair, a "user" certificate, a certificate chain, and "trusted" certificates.
The secrecy of encrypted data generally depends on the existence of a secret key shared between the communicating parties. Providing and distributing such secret keys is one aspect of key management. In a multiuser environment, secure key distribution may be difficult; public key cryptography was invented to solve this problem.

Public key cryptography is based on a secure secret key pair. Each key (one half of the pair) can only decrypt information encrypted by its corresponding key (the other half of the pair). A key pair includes:
• The private key, known only to its owner
• The public key, distributed widely, but still associated with its owner
Use of the cryptographic key pair to set up a secure, encrypted channel ensures the privacy of a message and validates the authenticity of the sender of the message. It also provides an important benefit: the ability to widely distribute the public key on a server, or in a central directory, without jeopardizing the integrity of the private key component of the key pair. This eliminates the need to transmit the public key to every correspondent in the system.
Each entity that participates in a public key system must have a public/private key pair. The public key for an entity is published by a certificate authority (CA) in a user certificate. Then, other entities that want to send it secure information can encrypt the information with the recipient entity's public key. Another use for a public key is for an entity that receives a communication to validate the sender's organizational affiliation.

Main Useful of Public Key

The PKI approach to security does not take the place of all other security technologies; rather, it is an alternative means of achieving security. The following advantages of PKI have led to its emergence as an industry standard for securing Internet and e-commerce applications.

• PKI is a standards-based technology.

• It allows the choice of trust provider.

• It is highly scalable. Users maintain their own certificates, and certificate authentication involves exchange of data between client and server only. This means that no third party authentication server needs to be online. There is thus no limit to the number of users who can be supported using PKI.

• PKI allows delegated trust. That is, a user who has obtained a certificate from a recognized and trusted certificate authority can authenticate himself to a server the very first time he connects to that server, without having previously been registered with the system.

• Although PKI is not notably a single sign-on service, it can be implemented in such a way as to enable single sign-on.
A certificate authority (CA) is a trusted third party that certifies that other entities--users, databases, administrators, clients, servers--are who they say they are. When it certifies a user, the certificate authority verifies the user's identity and grants a certificate, signing it with the certificate authority's private key. The certificate authority has its own certificate and public key, which it publishes, as well as a private key, which is securely maintained. Servers and clients use the CA's root certificate to verify signatures that the certificate authority has made. A certificate authority might be an external company that offers certificate services, or an internal organization such as a corporate MIS department
Public certificates

A certificate is like an electronic passport that proves the identity of a user or device that seeks to access the network. The certificate ensures that the entity's information is correct and that the public key actually belongs to that entity. A certificate is created when an entity's public key is signed by a trusted identity (a certificate authority). It contains information such as the following:
• the certificate user's name
• an expiration date
• a unique serial number assigned to the certificate by the CA
• the user's public key
• information about the rights and uses associated with the certificate
• the name of the certificate authority that issued the certificate
• the CA's signature
• an algorithm identifier that identifies which algorithm was used to sign the certificate

A trusted certificate, sometimes known as a root key certificate, typically belongs to a third party entity that is trusted to issue certificates. It is obtained in a secure manner and, operationally, does not need to be validated for its authenticity each time it is accessed because it is self-signed. A client or a server can validate that an entity is who it claims to be by verifying that the entity's certificate was issued by a known and trusted certificate authority.
Typically, certificate authorities whom you trust issue the user certificates. Oracle provides several default trusted certificates, so users do not have to install their own. These trusted certificates also enable servers to perform SSL authentication to clients who have wallets containing only trusted certificates.

34 comments:

  1. Dear Sir,
    could please send the procedure that how to enable PKI in NS2.
    thanks in advance for your kind support.

    ReplyDelete
  2. Dear Sir,
    could please send the procedure that how to enable PKI in NS2. sthuli1@yahoo.com

    ReplyDelete
  3. Hi Sir,

    I found the concept very attractive..
    Can you please provide the algorithm or help me with materials that would help me tounderstand the above?

    ReplyDelete
  4. hello sir,
    plz help me how to implement the PKC in NS 2.35.
    send me ur kind reply to alexsan2711@gmail.com


    thankyou sir.

    ReplyDelete
  5. Hello Arphita,

    Sure will help you please sen ur email address so that i can reply Thanks

    ReplyDelete
  6. Hi, Prasanna.

    I need to implement and simulate a key management schema on NS2 named IKM (Identity-Based Key Management), but I don't know how to configure a scenario for these simulations. How can I sim the network initialization?

    And about the implementation, I haven't seen any other impl. of a key management schema on NS2 to be based on. Do you have an example?

    Please, can you help me?

    Thanks a lot!
    Rafael

    ReplyDelete
  7. Hi
    I am a graduate student and working on WiMAX security. Could you Please provide the source code for me perumalrajar@gmail.com.

    Perumalraja

    ReplyDelete
  8. Hi Prasanna.

    By the way, my e-mail is rafa.hanke@gmail.com.

    Thanks a lot!
    Rafael Tiago Vieira

    ReplyDelete
  9. This comment has been removed by the author.

    ReplyDelete
  10. Dear Ns2users,

    Thanks for the support i hope all queries has been answered through mail, incase if not please send the mail once again will help you Thanks

    ReplyDelete
  11. Greetings Prasanna,

    I am trying to implement PKI enabled secure communication in NS2 for node security using AODV protocol. I wanna use openssl for same but i am stuck from where to begin.

    Can you share the procedure/documentation of how to enable and use PKI in NS2 or if possible a sample code for same?

    You can reach me at simran124@gmail.com.

    Thanks,
    Simranjeet

    ReplyDelete
    Replies
    1. hello sir,
      i'm trying to implement a new routing protocol in ns2.35 for wireless sensor network...
      my protocol in about controling access to the networks using access control lists and tickets for every node(like kerberos),avoiding replay attacks using nonce. in the network only the base station have a pair of public/private keys.
      i'll be grateful for any help you can provide to me to start implementing this. my mail is hayfa.benrejeb@gmail.com
      regards

      Delete
  12. Hello sir,

    In my thesis i have to analyse performance between OLSR and PKI OLSR and Symmetric crypto.


    So i must implement PKI same Simranjeet but using OLSR protocol. is it possible to use ns2 for olsr + PKI

    would you please share how to implement PKI in NS2 or if possible a sample code for it?

    my email supasj@gmail.com

    Many thanks,

    ReplyDelete
  13. Hello sir, Could u please tell how to implement PKI in ns2? my id is dspricilla@gmail.com

    ReplyDelete
  14. Hello
    I require the scenario of key distribution
    trchaitanya@gmail.com

    ReplyDelete
  15. Dear Prasanna,

    I am trying to analyze the time taken and power consumption on sensor networks. I need to simulate the scenario on ns2 simulator.

    could u pls mail me the codes of various cryptographic algorithms u have to sweetnivi88@gmail.com Also if u have the code for various communication protocols like bluetooth, zigbee etc kindly mail those. It wud be really helpful. Thansk

    ReplyDelete
  16. hi i would really like to know how to implement public/private key in ns2
    would you mind sending me the procedures and codes please?
    thanks a lot
    email: norman212046@gmail.com

    ReplyDelete
  17. sir i need to implement public/private key system in ns2...can you please give me the procedure
    thank you
    email: anosooapramanik@gmail.com

    ReplyDelete
  18. Greetings Prasanna,

    I am trying to implement a distributed PKI enabled secure communication in NS2 for vehicular adhoc network, i am stuck from where to begin.

    Can you help me and share the procedure/documentation, the implementation of how to enable and use PKI in NS2, how to generate, create a certificat by one node?

    You can reach me at wafa.masghouni@gmail.com

    Thanks,

    ReplyDelete
  19. I am implementing a distributed PKI enabled secure communication in MANET will you provide me the algorithm and steps

    ReplyDelete
    Replies
    1. HI

      Sure i will help you can you explain what type of crytographic and how many bit key needed can u send me the paper so that i can send u the code and help you Thanks

      Delete
  20. Hello! I'm Alex and I'm doing my project in Key-establishment in heterogeneous (cluster-based) wireless sensor networks. I'm comparing two schemes to demonstrate the better balanced use of sensor resources in one of them using ns-2. May I send you the two papers so u can help me in how can I start coding in ns-2?

    ReplyDelete
    Replies
    1. HI Alex

      Thanks for using my blog iam very much happy to help you Can you please send the paper to clickprasan@gmail,com so that will help you Thanks

      Delete
  21. hello Prasanna!!

    this is Saranya. i am doing my final yr proj in ns2. can u pls send me the documentation and codes for assigning public and private key along with the codes for encryption and decryption.

    ReplyDelete
  22. HI Saranya,

    Thanks for the mail, sure can you please share me the base paper to clickprasan@gmail.com and mean while encryption how many bit keys all information attached to it

    ReplyDelete
  23. Hello Saranya,
    Can you please share with me how to implement PKI in Ns2. My thesis focuses on improving the security of AODV in the context of VANETs. fiz4rizzle@gmail.com. Thanks

    ReplyDelete
  24. hello sir. my name in farahah and i'm having a trouble in enabling PKI in ns2.. can you please help me? this is my email.. itmightbeme10@gmail.com

    ReplyDelete
  25. Hello,
    Can anyone tell me how to configure simple PKI schema for VANET in ns2?
    Can mail me on ankitamithaiwla10@gmail.com

    ReplyDelete
    Replies
    1. Hi Ankita

      Thanks i tied to mail you but getting failure can you please mail me to CLickprasan@gmail.com so that will share it

      Delete
  26. Hey hi..

    Can you send me the code for pki implementation in ns2...It will be helpful...Thanks in Advance

    ReplyDelete
    Replies
    1. HI

      Yes can send you please mail me your paper and email addr to clickprasan@gmail.com after requirement will happy to share and teach

      Delete
  27. Hey hi..

    Can you send me the code for pki implementation in ns2...It will be helpful...Thanks in Advance

    ReplyDelete
  28. Hello,
    can you please tell me is it possible to implement public key management in ns2??

    ReplyDelete

Thanks for using my blog any queries or help please email to clickprasan@gmail.com . Please be careful from spammers .do not reply to any other email address other than mentioned above