Font Size: a A A

Research Of Jini Network Security On Wireless Ad Hoc Network

Posted on:2003-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:H X YaoFull Text:PDF
GTID:2168360092965839Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The evolvement of Jini network desires more attention paid on its security. But because of spontaneity and being dynamic, the research of Jini network security is quite intractable . Although some achievements have being obtained, many problems still remain unsolved.This paper spread its discusses around the issue of Jini network security and UOWHF construction. In this paper we first analyze the Jini security architectures existed then expand them. For UOWHF, a new algorithm is put forward based on previous achievements.The main works in this paper are as follows:1) An analysis of two representative Jini security architecture is given ,and two problems ,secure issuance of Jini service's proxy and secure leasing agent, are pointed out..2) A universal anonymous group issuance algorithm is put forward to resolve the problem of secure issuance of Jini service's proxy. The algorithm ,which combines public-key encryption with Oracle-Hashing ,can resolve the problem to issue a key in public cryptosystem.3) On the case of using RSA in a public cryptosystem, a quick anonymous group issuance algorithm is put forward in this paper. This quick algorithm, which benefits from RSA smartly, can resolve the intractable problem to issue a key in public cryptosystem and fits to employing beforehand computation to improve efficiency.4) To resolve the problem of secure leasing agent, a protocol called security leasing agent protocol is put forward in this paper. The protocol uses HMAC to guarantee the client being active, then protects leasing from attacks.5) In the aspect of UOWHF discovery, tree-Shoup construction is put forward in this paper. The construction is based on Shoup construction, but need only less random masks and makes UOWHF more practical.6) The paper put forward a primitive called one-way isolated function, which may be used to construct a new UOWHF. The new UOWHF may only use one inductive random mask and a popular random mask, but is not proved to be secure strictly and only be used as reference.
Keywords/Search Tags:Jini network security, anonymous group issuance, leasing agent, UOWHF, tree-Shoup construction
PDF Full Text Request
Related items