Public Key in Ns2
HI everybody here like to brief or just info about the Public Key infrastructure (Pki). Public Key is one of the method for cryptography using digital certificates used to transfer the data safe and securely. Explains how is done in Ns2.General explanation follows
Public-key cryptography requires that entities that want to communicate in a secure manner, possess certain security credentials. This collection of security credentials is stored in a wallet. Security credentials consist of a public/private key pair, a "user" certificate, a certificate chain, and "trusted" certificates.
The secrecy of encrypted data generally depends on the existence of a secret key shared between the communicating parties. Providing and distributing such secret keys is one aspect of key management. In a multiuser environment, secure key distribution may be difficult; public key cryptography was invented to solve this problem.
Public key cryptography is based on a secure secret key pair. Each key (one half of the pair) can only decrypt information encrypted by its corresponding key (the other half of the pair). A key pair includes:
• The private key, known only to its owner
• The public key, distributed widely, but still associated with its owner
Use of the cryptographic key pair to set up a secure, encrypted channel ensures the privacy of a message and validates the authenticity of the sender of the message. It also provides an important benefit: the ability to widely distribute the public key on a server, or in a central directory, without jeopardizing the integrity of the private key component of the key pair. This eliminates the need to transmit the public key to every correspondent in the system.
Each entity that participates in a public key system must have a public/private key pair. The public key for an entity is published by a certificate authority (CA) in a user certificate. Then, other entities that want to send it secure information can encrypt the information with the recipient entity's public key. Another use for a public key is for an entity that receives a communication to validate the sender's organizational affiliation.
Main Useful of Public Key
The PKI approach to security does not take the place of all other security technologies; rather, it is an alternative means of achieving security. The following advantages of PKI have led to its emergence as an industry standard for securing Internet and e-commerce applications.
• PKI is a standards-based technology.
• It allows the choice of trust provider.
• It is highly scalable. Users maintain their own certificates, and certificate authentication involves exchange of data between client and server only. This means that no third party authentication server needs to be online. There is thus no limit to the number of users who can be supported using PKI.
• PKI allows delegated trust. That is, a user who has obtained a certificate from a recognized and trusted certificate authority can authenticate himself to a server the very first time he connects to that server, without having previously been registered with the system.
• Although PKI is not notably a single sign-on service, it can be implemented in such a way as to enable single sign-on.
A certificate authority (CA) is a trusted third party that certifies that other entities--users, databases, administrators, clients, servers--are who they say they are. When it certifies a user, the certificate authority verifies the user's identity and grants a certificate, signing it with the certificate authority's private key. The certificate authority has its own certificate and public key, which it publishes, as well as a private key, which is securely maintained. Servers and clients use the CA's root certificate to verify signatures that the certificate authority has made. A certificate authority might be an external company that offers certificate services, or an internal organization such as a corporate MIS department
Public certificates
A certificate is like an electronic passport that proves the identity of a user or device that seeks to access the network. The certificate ensures that the entity's information is correct and that the public key actually belongs to that entity. A certificate is created when an entity's public key is signed by a trusted identity (a certificate authority). It contains information such as the following:
• the certificate user's name
• an expiration date
• a unique serial number assigned to the certificate by the CA
• the user's public key
• information about the rights and uses associated with the certificate
• the name of the certificate authority that issued the certificate
• the CA's signature
• an algorithm identifier that identifies which algorithm was used to sign the certificate
A trusted certificate, sometimes known as a root key certificate, typically belongs to a third party entity that is trusted to issue certificates. It is obtained in a secure manner and, operationally, does not need to be validated for its authenticity each time it is accessed because it is self-signed. A client or a server can validate that an entity is who it claims to be by verifying that the entity's certificate was issued by a known and trusted certificate authority.
Typically, certificate authorities whom you trust issue the user certificates. Oracle provides several default trusted certificates, so users do not have to install their own. These trusted certificates also enable servers to perform SSL authentication to clients who have wallets containing only trusted certificates.
Subscribe to:
Post Comments (Atom)
thnz for such a nice post
ReplyDeleteDear Sir,
ReplyDeletecould please send the procedure that how to enable PKI in NS2.
thanks in advance for your kind support.
Dear Sir,
ReplyDeletecould please send the procedure that how to enable PKI in NS2. sthuli1@yahoo.com
Hi Sir,
ReplyDeleteI found the concept very attractive..
Can you please provide the algorithm or help me with materials that would help me tounderstand the above?
hello sir,
ReplyDeleteplz help me how to implement the PKC in NS 2.35.
send me ur kind reply to alexsan2711@gmail.com
thankyou sir.
Hello Arphita,
ReplyDeleteSure will help you please sen ur email address so that i can reply Thanks
Hi, Prasanna.
ReplyDeleteI need to implement and simulate a key management schema on NS2 named IKM (Identity-Based Key Management), but I don't know how to configure a scenario for these simulations. How can I sim the network initialization?
And about the implementation, I haven't seen any other impl. of a key management schema on NS2 to be based on. Do you have an example?
Please, can you help me?
Thanks a lot!
Rafael
Hi
ReplyDeleteI am a graduate student and working on WiMAX security. Could you Please provide the source code for me perumalrajar@gmail.com.
Perumalraja
Hi Prasanna.
ReplyDeleteBy the way, my e-mail is rafa.hanke@gmail.com.
Thanks a lot!
Rafael Tiago Vieira
This comment has been removed by the author.
ReplyDeleteDear Ns2users,
ReplyDeleteThanks for the support i hope all queries has been answered through mail, incase if not please send the mail once again will help you Thanks
Greetings Prasanna,
ReplyDeleteI am trying to implement PKI enabled secure communication in NS2 for node security using AODV protocol. I wanna use openssl for same but i am stuck from where to begin.
Can you share the procedure/documentation of how to enable and use PKI in NS2 or if possible a sample code for same?
You can reach me at simran124@gmail.com.
Thanks,
Simranjeet
hello sir,
Deletei'm trying to implement a new routing protocol in ns2.35 for wireless sensor network...
my protocol in about controling access to the networks using access control lists and tickets for every node(like kerberos),avoiding replay attacks using nonce. in the network only the base station have a pair of public/private keys.
i'll be grateful for any help you can provide to me to start implementing this. my mail is hayfa.benrejeb@gmail.com
regards
Hello sir,
ReplyDeleteIn my thesis i have to analyse performance between OLSR and PKI OLSR and Symmetric crypto.
So i must implement PKI same Simranjeet but using OLSR protocol. is it possible to use ns2 for olsr + PKI
would you please share how to implement PKI in NS2 or if possible a sample code for it?
my email supasj@gmail.com
Many thanks,
Hello sir, Could u please tell how to implement PKI in ns2? my id is dspricilla@gmail.com
ReplyDeleteHello
ReplyDeleteI require the scenario of key distribution
trchaitanya@gmail.com
Dear Prasanna,
ReplyDeleteI am trying to analyze the time taken and power consumption on sensor networks. I need to simulate the scenario on ns2 simulator.
could u pls mail me the codes of various cryptographic algorithms u have to sweetnivi88@gmail.com Also if u have the code for various communication protocols like bluetooth, zigbee etc kindly mail those. It wud be really helpful. Thansk
hi i would really like to know how to implement public/private key in ns2
ReplyDeletewould you mind sending me the procedures and codes please?
thanks a lot
email: norman212046@gmail.com
sir i need to implement public/private key system in ns2...can you please give me the procedure
ReplyDeletethank you
email: anosooapramanik@gmail.com
Greetings Prasanna,
ReplyDeleteI am trying to implement a distributed PKI enabled secure communication in NS2 for vehicular adhoc network, i am stuck from where to begin.
Can you help me and share the procedure/documentation, the implementation of how to enable and use PKI in NS2, how to generate, create a certificat by one node?
You can reach me at wafa.masghouni@gmail.com
Thanks,
I am implementing a distributed PKI enabled secure communication in MANET will you provide me the algorithm and steps
ReplyDeleteHI
DeleteSure i will help you can you explain what type of crytographic and how many bit key needed can u send me the paper so that i can send u the code and help you Thanks
Hello! I'm Alex and I'm doing my project in Key-establishment in heterogeneous (cluster-based) wireless sensor networks. I'm comparing two schemes to demonstrate the better balanced use of sensor resources in one of them using ns-2. May I send you the two papers so u can help me in how can I start coding in ns-2?
ReplyDeleteHI Alex
DeleteThanks for using my blog iam very much happy to help you Can you please send the paper to clickprasan@gmail,com so that will help you Thanks
hello Prasanna!!
ReplyDeletethis is Saranya. i am doing my final yr proj in ns2. can u pls send me the documentation and codes for assigning public and private key along with the codes for encryption and decryption.
HI Saranya,
ReplyDeleteThanks for the mail, sure can you please share me the base paper to clickprasan@gmail.com and mean while encryption how many bit keys all information attached to it
Hello Saranya,
ReplyDeleteCan you please share with me how to implement PKI in Ns2. My thesis focuses on improving the security of AODV in the context of VANETs. fiz4rizzle@gmail.com. Thanks
hello sir. my name in farahah and i'm having a trouble in enabling PKI in ns2.. can you please help me? this is my email.. itmightbeme10@gmail.com
ReplyDeleteHello,
ReplyDeleteCan anyone tell me how to configure simple PKI schema for VANET in ns2?
Can mail me on ankitamithaiwla10@gmail.com
Hi Ankita
DeleteThanks i tied to mail you but getting failure can you please mail me to CLickprasan@gmail.com so that will share it
Hey hi..
ReplyDeleteCan you send me the code for pki implementation in ns2...It will be helpful...Thanks in Advance
HI
DeleteYes can send you please mail me your paper and email addr to clickprasan@gmail.com after requirement will happy to share and teach
Hey hi..
ReplyDeleteCan you send me the code for pki implementation in ns2...It will be helpful...Thanks in Advance
Hello,
ReplyDeletecan you please tell me is it possible to implement public key management in ns2??