Font Size: a A A

A Manet Network Based On Clustering Structure And Security Access Technology Research

Posted on:2014-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2248330395483373Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc Networks (MANET) can quickly, flexibly make network under the conditions without or hard to use the existing network infrastructure. It broadens the range of the traditional mobile communication network and has been widely used in military communications, emergency relief, mobile conferencing, sensor networks and other fields.It is always the key technology to design the efficient networking algorithms to help MANET optimizeing the network architecture, improving the communication efficiency and reducing the resource consumption of node. In addition, under the environment of information countermeasure such as military communication, secure access mechanism designed for different network architectures of MANET is an important manner to protect the security of MANET. For this reason, the clustering of MANET networking and the certificateless method of secure access are intensive studied, and a corresponding improved method and the overall scheme are proposed. The main work and achievements are as follows:(1) Based on the detailed introdction of the existing typical clustering methods, aiming to the problem that the current MANET clustering methods did not sufficiently considers the static capacity of nodes, a trust-based model of MANET clustering algorithm is proposed, and then an appropriate clustering protocol is designed. This algorithm colligates various of environment parameters of network which affect network performance and the combined weighted idea. The method improves the reliability, viability and security of network in a certain extent by comprehensive considering the dynamic and static performances of nodes.(2) Based on in-depth research on the development status of MANET secure access technology, the security vulnerabilities of an existing certificateless secure access algorithm is analyzed and some specific attack methods are given. Then it provides corresponding improvement method for the security vulnerabilities and analysis of the performance. Based on an improved certificateless method, introducing an offline third-party trust party and the message signature mechanism, an improved certificateless secure access schome is proposed. The improved scheme can effectively resist the Sybil and Man-in-the-Middle attack from the malicious node, and improve the security of the key management process of the certificateless secure access solution.(3) Combining the clustering method based on trust model and the improved certificateless secure access method, a clustering-oriented structure certificateless secure access solution is proposed and the security analysis of the scheme is systemically analyzed. The scheme provides complete secure access and management service for the node of MANET network including the system initialization, secure access of new node, digital signatures for messages, secure communication, key updates, identity revocation and so on.Finally, a summary is given for the results that are obtained in the study. The deficiencies in the existing research are pointed out and the outlook of some notable issues also been presented.
Keywords/Search Tags:MANET, threshold secret sharing, certificateless, clustering, secure access
PDF Full Text Request
Related items