Font Size: a A A

Research On Key Management And Authentication Technology Of Ad Hoc Network Based On Threshold Mechanism

Posted on:2009-04-17Degree:MasterType:Thesis
Country:ChinaCandidate:T J YangFull Text:PDF
GTID:2178360242978057Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
A mobile Ad hoc network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Mobile Ad hoc network is an emerging research area with practical applications. However, mobile Ad hoc network is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. So to ensure the security of mobile Ad hoc network is very important, and the focus is to provide key management services and authentication.This thesis introduces the foundational conception, features, security requirements and security threats of mobile Ad hoc networks; provides a state-of-the-art view of security in Ad hoc networks; then describes key management and authentication service architecture based on a threshold secret sharing mechanism according to the network characteristics, and discusses in detail the security aspects of key management and security authentication.The main contributions of this paper include:1. An effective scheme for distributed key management and authentication system is given, in which the architecture and its component is described, focuses on the process of the generation of private key shares and dynamically refreshing the private key shares as well as efficient security solutions for certificate issuing, combination, and revocation. The methods solve some key management and secure authentication problems to some extent2. The system of distributed key management and authentication service for mobile Ad hoc network is designed and realized on the basis of above research. The composed module and design flow for the system are discussed in detail. The realized system verifies availability of distributed key management and authentication method.
Keywords/Search Tags:Mobile Ad hoc network, Key management, Security authentication, Threshold mechanism
PDF Full Text Request
Related items