Font Size: a A A

Research On Key Management In Mobile Ad Hoc Network

Posted on:2019-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y X WuFull Text:PDF
GTID:2348330569495739Subject:Engineering
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc network is a multi-hop,decentralized,self-organized wireless network.It is widely used in various fields,because of its lightweight,etc.However,these advantages also bring more threats to the mobile ad hoc network security.As for mobile ad hoc network key management,traditional key management based on static method cannot be directly applied to mobile ad hoc networks because of its topological variability.Meanwhile,mobile ad hoc network also needs key management schema to solve authentication and communication problem.Therefore,the research on mobile ad hoc network key management is a very important issue.First of all,this paper studies the mobile ad hoc network key security distribution and proposes a key security distribution model multi-factor authenticated key exchange scheme for mobile ad hoc network.This model uses the cryptography method to solve sub-key distribution problem and then proves its security in the presence of rivals.At last we verify our scheme by simulation.Second,we use the combined RSA(t,n)threshold strategy to optimize the mobile ad-hoc network key distribution process process and propose a mobile ad hoc network key distribution model based on combined RSA(t,n)threshold.In this model,the key generation process will be transferred to each node so that the sub-key can be securely assigned in the presence of an adversary and this strategy can also implement the secure communication between nodes,the key distribution and removal,message signature process.At last,in order to solve the node access security problem,we introduce block-chain model.Besides,we also introduce credibility.We save each node's action information and calculate its credibility in every node by using the characteristics of distributed chainstore in the block-chain,then we use credibility to determin the node's route action and number of neighbor nodes that run IDS.By this method,we achieve the limit on node's be behavior and save energy under security condition.
Keywords/Search Tags:Mobile Ad Hoc Network, Key Distribution, Secret Management, Security Access, Block Chain
PDF Full Text Request
Related items