Font Size: a A A

Formal Analysis And Design Of Wireless Network Protocols

Posted on:2009-03-21Degree:DoctorType:Dissertation
Country:ChinaCandidate:C YangFull Text:PDF
GTID:1118360245468515Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid growth of information and network technologies, information networks have been an important mark of development and advancement of the modern society. But there exist some common problems in physics, logic and cost of the traditional networks for the restriction of environmental conditions. So, developing the feasible Wireless Communication network technologies to extend the current networks have become the important study direction of data networks. However, wireless networks face great challenges in security and path selection. So, security protocols and routing protocols are the base of constructing the architecture of wireless networks and have very important research significance.This work makes a comparative deep research on the provably secure authentication and key exchange protocols, and wireless mesh network routing protocols, including provably secure theories for authentication and key exchange, authentication protocols in the Internet, authentication and key exchange protocols for access and roaming in wireless mesh networks, and hybrid wireless mesh routing protocols. The main results are as following:1. we introduce the basic concept, secure theories and formalization method of the Canetti-Krawczyk (CK) and Universally Composable(UC) security model. Based on systematic analyzing the secure attributes of these security models, we summarize the general methods and steps for analysis and design of security protocols in the provably security models.2. The security of the new Internet Key Exchange Protocol (IKEv2) is analyzed. The result shows that IKEv2 has some problems of authentication failure and initiator's identity exposure, so improvements are given. By using"alias"and involving the peer's identity in signature, the new protocol can realize the efficient authentication and active identity protection to the initiator. Moreover, the non-repudiation of the peers for their interactions is also achieved.3. The authentication protocol of Wireless Mesh Networks does not support the 802.1X-based mutual authentications. To solving this problem, a new authentication protocol is proposed, which is based on the basic idea of DH exchange, the technology of trust transfer and the combination characteristic of UC security model. The new protocol provides mutual authentication for Wireless Mesh Networks and it is provably secure with the UC model. According to the special security demand of wireless mesh networks, a new roaming authentication protocol that satisfies the UC-security is proposed. Such protocol guarantees the confidentiality of user's identity and works well in the roaming environment of mesh networks.4. Low efficiency and poor expansibility are the essential problems of routing protocol in wireless mesh networks. On the basis of the distributed and centralized routing protocol, a new protocol WMRP (Wireless Mesh Route Protocol) is proposed. Such protocol extends the flat routing mechanism to the class routing architecture which is similar to the IP routing and improves the efficiency and expansibility of routing protocol greatly. Through the network simulation and performance evaluation, the result shows that the new routing protocol has advantages in performance over the existing protocol.
Keywords/Search Tags:Provable Security, Formal Analysis, Cryptography Protocol, Mesh Roating Protocol, Network Simulation
PDF Full Text Request
Related items