Font Size: a A A

Research On Node Anonymous Protection In Ad Hoc Networks

Posted on:2013-11-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:F B LiuFull Text:PDF
GTID:1228330395483722Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Ad Hoc network does not need the infrastructure and has the features of self organization and self management, so it is widely used in the military, emergency rescue and other environment. In the battlefield environment with a lot of attacker’s, Ad Hoc network security is facing great challenges, and anonymous protection research has become a hot research topic. Ad Hoc network is self organization, no center, and the nodes are high mobility, computational power limited, energy limited, storage space limited, which makes conventional network security strategy is no longer applicable, so we must design new securely strategy for Ad Hoc network.We have deeply studied on key management, anonymous routing, anonymous authentication and so on, and the research achievements and innovations are as follow:1To reduce asymmetric encryption operations during the anonymous protocols establishment, we propose An Energy efficient Anonymous Routing Protocol based on Zero Knowledge Proofs for Mobile Ad hoc Networks. It reduces asymmetric encryption operations in three ways:firstly, it uses Zero Knowledge Proofs of Authentication Protocols to construct the trapdoor in order to reduce asymmetric encryption operations of decryption the trapdoor; secondly, it makes nodes exchange secret information with each other in route reply phase;thirdly, it makes full use of the established session key, and reduces unnecessary key establishment work. Our protocol analysis study and simulations show that it can reduce energy consumption efficiently in the same lever of security, anonymity and real-time.2Compare with RSA, Elliptic Curve Cryptosystem has the features of less computation, shorter encryption keys, and the Ad Hoc network nodes are high mobility, computational power limited, energy limited, storage space limited, so the Elliptic Curve Cryptosystem is more suitable for Ad Hoc network. We applied bilinear pairing into session key establishment, and proposed an anonymous routing protocol based on bilinear pairing, which reduces computation complexity heavily. Our analysis and simulation study verify that our protocol is much better than existing anonymous routing protocols on the aspects of energy efficiency and end-end delay.3In order to provide anonymous authentication for Ad Hoc network, we combine Democratic Group Signatures with Centerless Secret Sharing Scheme and propose a threshold traceability anonymous authentication scheme without trusted center for Ad Hoc network. The scheme is centerless and self-organized, which is well suited to the characters of Ad Hoc network and has solved the problem that those schemes of traditional network are not suited to the Ad Hoc network. The Prover of the scheme is anonymous, traceable, and complete, which well satisfies the security of anonymous authentication.4The proposed public-key managements of Ad hoc networks must take many nodes as service nodes, which run counter to the characters of Ad hoc networks, such as self-organized and centerless. They also take much traffic to create public-private key pairs and certificates, and they are poor in robustness. In this paper, we propose a novel fully self-organized public-key management system that takes Zero Knowledge Proofs into the process of certification and allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any certralized services. Our protocol analysis study and simulations prove that the public-key management system has low traffic, high reliability and robustness。...
Keywords/Search Tags:MANET, anonymous protection, anonymous routing, anonymousauthentication, key management
PDF Full Text Request
Related items