Project 2.A Extending NS-2 to support encryption/decryption

Download Report

Transcript Project 2.A Extending NS-2 to support encryption/decryption

Project 2.A
Extending NS-2 to support
encryption/decryption
Date: 04/07/2005
Course: CSCI 5931
Name: Sam Tran
Tuan Nguyen
Extending NS-2 to support
encryption/decryption
1.
2.
3.
4.
5.
6.
7.
8.
Abstract
Approach
How to add new security features in NS-2
General design encryption/decryption in NS-2
Implementation
Simple demonstration
Conclusion
References
1. Abstract
Implementation of security on NS-2 is necessary
in network simulation. However, currently, NS-2
does not support these features. Our project will
aim to solve this issue.
2. Approach
• NS-2 is open source network simulation
application.
• NS-2 currently supports IP protocol suite
and various standard routing protocols for
wire and wireless network.
• To add security functions. We have to
modify/build new packet formats.
3. Add new security features in NS-2
• Define a new packet format.
• Derive new class from Agent class for
processing this new packet format.
• Processing includes:
– Encrypting function.
– Decrypting function.
– Message digest generation function.
– E.t.c
4. General design flow for security
packet in NS-2
Figure1: Steps to add new packet to NS-2 and testing results
5. Implementation
Receiver
System console
Decrypted text
Sender
Plain text
System console
Hash
function
Decryption
CESAR cipher
Key=3
Encrypted text +hash
value
Encrypted text +hash
value
Encryption
CESAR cipher
Key=3
Acknowledgement
Hash
function
Acknowledgement
Compare
hashed
value
Figure 2: Logical design of the encryption/decryption system
5. Implementation (cont.)
• Hash function
– Polynomial Algorithm.
• Encryption function
– Input: String of plain text
– Algorithm: CESAR cipher with pre-shared key of 3
– Output: Encrypted text.
• Decryption function
– Input: string of encrypted text
– Algorithm: CESAR cipher with pre-shared key of 3
– Output: decrypted text.
6. Simple demonstration
Figure 3: Outcome of simple demonstration script.
7. Conclusion
• The project shows a method to add
security functions into NS-2.
• With this approach, we can build standard
security components into NS-2 using
industrial standard algorithm such as SHA1, MD5 for hash function and DES,3DES
and AES for encryption/decryption.
• Project can be extended to support
asymmetric key encryption/decryption.
8. References
• Marc Greis (2005). Tutorial for the network
simulator ns. Retrieved 3/28/05 from:
http://www.isi.edu/nsnam/ns/tutorial/index.html
• Free Information Society (2005). Hash Table
Class. Retrieved 4/4/05 from:
http://www.freeinfosociety.com/computers/progra
ms/cpp/hashtable.h
• Jess Garms, Daniel Somerfield (2001).
Professional Java Security. ISBN 1-861004-25-7
• Hash function implemented in C++ with
polynomial algorithm. Retrieved 4/14/05 from
http://wikisource.org/wiki/Polynomial_hash_funct
ion