Font Size: a A A

Research On Key Technologies Of Personal Network Interconnection Secure Routing

Posted on:2009-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y X LuFull Text:PDF
GTID:2178360245459196Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
A mobile ad hoc network(MANET) is a special wireless network that is self-organized by a set of mobile nodes. It can be quickly set up to provide mobile communication without any underlying infrastucture and can provide users with the capability of information access at anytime and anywhere. Security is essential for MANET and is also one of the hot areas in MANET research nowadays. It is especially critical in a wireless Personal Network(PN) which is composed of heterogeneous personal wireless devices.Personal Networks comprise "all of a person's devices capable of network connection whether in his or her wireless vicinity, at home or in the office". PNs can be configured in ad hoc fashion, as the opportunity and the demand arise to support personal applications. Persoal Networks will support the user's professional and private activities without jeopardizing privacy and security. When the communication between local and remote devices is based on ad hoc networking, the kinds of attacks can include: Refusal to coorperate in the forwarding of packets in various different ways; Providing false information for the routing protocol, causing routes to go nowhere or through unnecessarily long paths; Failures in intermediate nodes, which may not even be malicious, but have the same effect. Therefore in order for the rapid, effective and secure communication, to study the secure routing protocol for Personal Networks is very important.The article first introduces the application, characteristic and the routing protocol of Mobile Ad hoc networks, as well as the research on its security problems, including the security threats, security target that the network is faced with. Based the research on typical secure routing protocol and key management of MANETs, we can find that most secure protocols used now trust a third party distributing public-key to authenticate the information, suffers from large overhead and route discovery latency. So a new key management scheme using provable identity-based signcryption and threshold secret sharing cryptography is proposed, it is a certificateless solution in that public keys of mobile nodes are derivable from their know IDs. Thus it eliminates the need for certificate-based authenticated public-key distribution which is indispensable in conventional public-key management schemes. In the view of in-deep research on the concept and structure of Personal Networks, we propose an identify-based secure routing scheme. Among the PN secure routing schemes proposed so far, most of them do not consider that user devices are power limited and the security for them should be as light-weight as possible. The identity-basd signcryption mechanism used in our routing protocol uses hash function as basic operation, so the common nodes can bear the resource cost of this mechanism. In the routing discovery phase, hash values keyed with shared keys between pairs of mobile nodes are used to verify of the path discovered is present and end-to-end integrity are used to prevent routing information from tamper attack, fabricate attack and route reply attack. The theoretic analysis and network simulations show that the secure routing protocol can effectively prevent a wide range of attacks to PNs, and is able to maintain high packet delivery ratio, even when a few nodes are compromised, can provide efficient and secure network for Personal Network.
Keywords/Search Tags:Personal Network, Secure routing, Ad hoc, Identity-based authentication, Routing protocol
PDF Full Text Request
Related items