Wireless Ad Hoc networks composed of mobile terminal nodes with wireless communication devices are typically characterized by their multi-hop, temporary and un-center. Because the node is moved in Ad Hoc network, the topological structure of the network is changing constantly, characteristics such as distributed cooperating and limited ability, etc. it is extremely easy to be attacked. The routing security and the key management of Ad Hoc are an important research topic.The paper introduced the basic concepts, features, security requirements and security threats of Ad Hoc networks at first. It studied the theory of key management, and on the basis of above research it has researched the method of distributed key management and authentication, then analyses the realization method of a distributed parallel key of authentication. This paper has studied the routing protocol of Ad Hoc networks in detail, and has carried on deep research on the routing safety, then based on the theory of distributed key management and authentication, has proposed a kind of safe routing mechanism. This kind of mechanism has been applied to trust dispersible strategy of the third part, which has solved distributional authentication problem among the nodes and provided a safe route strategy for Ad Hoc networks. It also introduces a framework of management of group key, and proposes an optimal algorithm for updating group key. Finally it carries on simulation of the updating algorithm by NS2 software, the results show that the new updating algorithm further reduces communication costs when the node group key updates, and therefore the network delay is lower, so it demonstrates that the algorithm is effective and available for Ad Hoc networks.This paper is divided into 6 chapters altogether;its contents are as follows:Chapter 1 introduces the concept, history, characteristic, research focus of Ad Hoc networks.Chapter 2 analyzes the challenge that Ad Hoc networks faces, and then introduces the security goal of Ad Hoc networks, safe tactics and securitymechanism.Chapter 3 introduces basic theories of key management and a key management mechanism at first, then describes a implementation method of distributed authentication.Chapter 4 discusses the routing protocol of Ad Hoc at first, then proposes a kind of safe route mechanism against the attack of Ad Hoc networks routing protocol.Chapter 5 describes the framework of group's key management at first, then on the basis of the framework, proposes a group key upgrade algorithm, and makes simulation experiments of the proposed algorithm using simulation software NS.Chapter 6 summarizes this paper, at the same time, suggestions for future research are given.This paper is supported by National Natural Science Foundation of China (Projects No: 90304018). |