Font Size: a A A

Distributed Trust Model For Mobile Ad Hoc Networks Research

Posted on:2007-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z K WangFull Text:PDF
GTID:2208360182479140Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Mobile self-organized network is an application of AD HOC net in wireless network area. It was used mainly in military bat fields, and is gaining more and more attention in civil fields with the wide application of various wireless technology, such as Bluetooth, 802.11 etc.Compared with other communication networks, wireless AD HOC network has the following characteristics: the network self-organizing ability, the dynamic topology, the distributed network management, multi-hopping, functional limitations of network nodes, limitations of common wireless networks, the possibility of one-way transmission tunnel exists, weak security and temporariness features etc.Trust models, key management, security routing, and invasion detection etc, are several important aspects of mobile AD HOC network security research. We mainly study the proactive secret renewal mechanism in asynchronous network. The paper focused on the analysis and improvement of current distributed CA certification method.The main work finished in the paper is as following:1. Analyzing the technology of AD HOCThe paper analyzes the AD HOC network technology generation, application, development, and several AD HOC network security authentication models together with their rationale and technical foundation, such as symmetric key algorithm, public key algorithm, PKI-based authentication model, distributed authentication model, threshold theory, network classifying (clustering) technology etc., and compares the advantages and disadvantages of several models briefly.2. Improving the current distributed CA authentication modelBased on existing PKI public key management mechanism and distributed authentication model, the paper combines hierarchical network architecture technology and group signature mechanism, improves the current distributed CA certification model, and puts forward a method of solving the secret partition loss problem during secret sharing course, by making redundant authentication information backup. The secret partition loss problem which was often ignored in available models might be caused by the AD HOC network asynchronism and unreliable links. The improved authentication model tries to prevent excessive resource consumption and theintroduction of unreliable nodes when generating a brand-new secret partition.3. System simulationIn the last part, the paper elaborates the modeling and simulation process and result of the proposed improved model with network emulator Opnet Modeler. The system simulation results confirm the improved model's feasibility from comparison of success rate and time delay of secret partition updating, and system communication performance.
Keywords/Search Tags:AD HOC, trust model, distributed authorization, ranked network, signature, secret sharing
PDF Full Text Request
Related items