Font Size: a A A

Study On Some Security Issues In The Ad Hoc Networks

Posted on:2008-08-11Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z Y LiuFull Text:PDF
GTID:1118360272966788Subject:Information security
Abstract/Summary:PDF Full Text Request
Wireless Ad Hoc network is a multi-hop temporary autonomous network system with a group of wireless mobile terminals. The terminals have the routing function, and it can construct any network topology. Ad Hoc networks can work solely, and it also connects internet or cellular networks. Comparing with regular mobile network and fixed network, Ad Hoc networks are non-center, self-organize, multi-hop and dynamic topology. These characteristic makes many differences in architecture, network organization and protocol designing. Wireless networks risk much more due to their open and instable wireless channels. As ad hoc networking somewhat varies from the traditional approaches, the security aspects that are valid in the networks of the past are not fully applicable in wireless Ad Hoc networks. And it is difficult to realize the security goals for Wireless Ad hoc network because of its complexity and instability.Aiming the secure requirement and practical base, this paper researches the related theory and pivotal technology. We study the security goals to be achieved and the threats wireless Ad Hoc network faces, and we focus primarily on the routing security and key management in wireless Ad Hoc network. The main tasks include several aspects:(1) Based on the non-interactive and information-theoretic secure verifiable commitment scheme and combined with Shamir's threshold secret sharing scheme, a multi-party secure computation scheme that generates a (k, n) threshold secret sharing was constructed in this paper. The scheme enjoys high security at the verifying stage. It can avoid any participant to cheat in the protocol and resist less than k participants'coalition. The scheme is high efficient, because the generation of shares of the secret is non-interactive. In addition, we gave the proof of security and analyzed the performance of our scheme.(2) Analyzes mobile node authentication in Mobile Ad Hoc Networks. The proposed authentication scheme based on Signcryption could be used to realize efficient and secure authentication in distributed mobility environment, and to generate non-interactive session keys between two mobile nodes.(2) Studies the group key management scheme in Ad Hoc Networks. Based on the identity-based authentication mechanism and threshold cryptography, a new identity-based distributed group key management scheme (IBDGK) is proposed. The proposed scheme has the characters of security, robustness and self-adaptability. It can resist coalition attacks and effectively trace the malicious nodes. Compared with other relevant research work, the proposed schemes have better security and efficiency.(3) Studies the trust management in Ad hoc Network. Presents a novel global trust model and gives a distributed implementation method. Mathematic analyses show that, compared to the current global trust model, the proposed model is more robust on trust security problems.(4) Analyzes the wireless network secure problem and proposes a secure LEACH routing protocol. It induces the secure authentication and uses the BAN proving it. The reputation mechanism ensures that the selfish node will abide the protocol. The result of simulation shows that SLEACH has the acceptable affect.(5) Privacy preservation is the vital problem to access control of the Wireless Sensor Networks. The schemes proposed recently can not resolve those troubles in privacy preservation very well, such as confidentiality, or leaking additional privacy information. The target of security about privacy preservation is discussed, then an identify based privacy preservation scheme is proposed, which not only satisfies the security target, but also need only one communication. Finally, the scheme proposed is IND-CCA2 secure.Additionally, some new considerations are discussed in Ad Hoc Networks, which will possibly be the valuable research fields in future.
Keywords/Search Tags:Ad Hoc Network, Authentication Protocol, Group Key Management, Secure Route, Access Control
PDF Full Text Request
Related items