Font Size: a A A

Research On Key Security Technologies In Ad Hoc Network

Posted on:2012-12-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LiFull Text:PDF
GTID:2178330332987512Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Wireless Ad hoc network is composed of mobile nodes that carry out networking functions such as packet forwarding and routing. Wireless Ad hoc network does not need any pre-established infrastructure, all available nodes in wireless Ad hoc network have to carry out networking functions. Due to these characteristics, wireless Ad hoc network is especially exposed to security threats such as forging, impersonating, and DoS.In order to protect wireless Ad hoc network from these threats, in this thesis, we presents a security architectures which is based on ID-based public key cryptography, it contains components as follows: ID-based aggregate signature scheme, admission control protocol, distributed key agreement protocol, distributed key generation protocol, key update protocol, ID-based encryption and decryption scheme, and secure routing, admission control and key management with above protocols.Jumin Song et. al presented an ID-based aggregate signature, applied it to Ad hoc networks and proposed a secure routing scheme. In this thesis, we analyze Jumin Song et. al's aggregate signature scheme and give a forgery attack on Jumin Song et. al's scheme. In addition, we analyzes Craig Gentry et. al's ID-based aggregate signature, and apply above aggregate signatures to wireless Ad hoc network to present secure routing scheme.Before secure routing which is based on aggregate signature is deployed, we must solve the generation and iussing of the key which used by aggregate signature. And, before generating and iussing key for user nodes, the identity of nodes must be authenticated. Therefore, admission control and key management is the precondition of deploying aggregate signature-based secure routing.In this thesis, we give an admission control protocol with CGA. Nodes verify each other's CGAs, public keys and the signature on the data structure of CGAs to achieve mutual authentication between nodes. Meanwhile, the admission control achieves IP autoconfigure.In this thesis, key management module contains components as follow: distributed key agreement, distributed key generation and distributed key update scheme.We apply Chen Huiyan et. al's distributed key generation scheme to achieve distributed key agreement. Meanwhile, we propose a key generating and issuing schemes, and a key update schemes. In order to achieve distributed key agreement, distributed key generation and distributed key update scheme with secure communication, we apply Zheng Gong et. al's ID-based encryption and decryption scheme to achieve secure communication.Meanwhile, we simple presents a security architectures which is based on certifica- teless public key cryptography, and which compares to the security architectures based on ID-based public key cryptography, they have same structure, admission control prot- ocol and distributed key agreement protocol.They have differences in distributed key generation protocol, key update protocol, therefore, we present corresponding distribut- ed key generation protocol and key update protocol, and apply Zheng Gong et. al's certificateless aggregate signature to wireless Ad hoc network to present secure routing scheme.
Keywords/Search Tags:Ad hoc networks, Aggregate signature, Admission control, Key management, Secure routing
PDF Full Text Request
Related items