Font Size: a A A

Applications Of ID-Based Cryptography To Mobile Ad Hoc Network

Posted on:2008-10-13Degree:DoctorType:Dissertation
Country:ChinaCandidate:H Y ChenFull Text:PDF
GTID:1118360215967524Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
In the thesis, we present an ID-based security architecture which adaptsto mobile Ad Hoc networks and which contains components as follows:distributed key generation protocol, secret sharing update, key management,ID-based signature schemes, ID-based sigcryption schemes, and mutualauthentication, key agreement and secure routing between nodes in mobileAd Hoc network with ID-based cryptography.Because the distributed key generation scheme which is presented byRosario Gennario et al. needs extensive computation, we give a distributedkey generation scheme MANT-DKG which is based on Stinson&Wei'ssecret sharing scheme and is secure when static adversary exists and whichis better than their scheme and is almost equal to Pedersen's scheme (RosarioGennario et al. have pointed out that Pedersen's scheme is insecure) incomputation efficiency. Taking advantage of the property that MANT-DKGis based on symmetric bivariate polynomial, a user node can be convertedconveniently into a service node which can play the role of the keygeneration center (KGC) in ID-based cryptography system by cooperationwith other service nodes. The above process doesn't need the interactionbetween service nodes.In the thesis, we give a secret sharing update scheme which defendsagainst the mobile adversary who attacks service node's sharing of s andwhich can detect the corrupted service node and recover its good sharing ofS.In the thesis, for user node, we presented the key generating and issuingscheme and the key update and revocation scheme which is considered asupdating the identity information of user node. The key revocation scheme by us is based on the scheme by Katrin Hoper and Gong Guang, but betterthan it in defending against the collation attack of malicious nodes. Onidentity of node, in order to make user node apply its private key from KGCand make KGC authenticate the identity of user node on line, we suggestthat mobile Ad Hoe network is built on IPv6 and present the mechanism ofbinding IP address with the identity.In the thesis, we construct two ID-based signature schemes with messagerecovery and an ID-based signcryption scheme. To the best of ourknowledge, two signature schemes by us are better than any other scheme incomputation efficiency and the total size of original message and itsappended signature.In the thesis, In order to achieve the mutual authentication, the keyagreement, and the secure routing between nodes, we design ID-based TLSprotocol, ID-based Diffie-Hellman protocol, and the secure route discoverymechanism based on ID-Based cryptography, too.
Keywords/Search Tags:Bilinear pairing, Distributed key generation, ID-based signcryp-tion, Mobile Ad Hoc network, Secret sharing
PDF Full Text Request
Related items