Font Size: a A A

Mobile Networking Threshold Dynamic Authentication Scheme

Posted on:2012-09-29Degree:MasterType:Thesis
Country:ChinaCandidate:L W TanFull Text:PDF
GTID:2218330335991631Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Mobile ad hoc network is a temporary autonomy system in which a collection of mobile host nodes have independent transceivers, with the aid of wireless link, rapid building and deployment for temporary local communication, self-organize to be a temporary network with multi-hop routing. It has a dynamic topology that is changed with the time. So it can be deployed in an occasion that is unable or unfit to build network facilities. It needs to build a temporary network in a short time, such as in a military battle, disaster recovery and other temporary interactive communication shared occasions. Currently, the research on mobile ad hoc network has been a hot topic which covers diverse scopes. Meanwhile the new demand of applications and the promoteness of other subjects, it exists also lots of opportunities and challenges. It has inherent features, such as wireless link, no fixed infrastructure or centralized administration, mobility of nodes, dynamic topology that is changed with the time, limited radio range, significant constraints in all the resources, computing ability, energy, bandwidth, memory, etc. There are more serious security problems in mobile ad hoc network. This paper mainly researches the authentication problem in mobile ad hoc network.Authentication includes entity identification and network behavior authentication. Identification authentication is that a network member makes sure the identification of other members. It provides a secure mechanism for access to network. Behavior authentication offers an authentication and supervision to the behavior of legal node after it successfully passing an authentication procedure. In the mass mobile ad hoc network, it is suitable to adopt the hierarchical levels structure with cluster as a basic unit of the associated topology structure, using local management and divide-rule of the network, limiting the preliminary information process and routing information into clusters to lessen the commucication traffic. An anthentication scheme based on dynamic ID and dynamic password is proposed and is able to apply to a node to the cluster head. The two nodes after authentication with their cluster head, with the aid of the cluster as a trust server execute three-parties based on password authentication key negotiation. Considering the behavior authentication, by introducing dynamic trust evaluation mechanism into authentication procedure, this paper proposes the information of behavior in network of nodes as a feedback to the trust computing, to make the trust values of nodes dynamic updating with communication continuing. In the process of trust value updating, local nodes supervise mutually. At the last part, a novel threshold certification updating scheme based on trust weight for mobile ad hoc network is proposed. Detailed analysis of the scheme is given at the end.
Keywords/Search Tags:mobile ad hoc network, authentication, trust valuation, dynamic, threshold
PDF Full Text Request
Related items