Font Size: a A A

Security Management Mechanism Based On Trusted Computing In Ad-Hoc Network

Posted on:2008-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:H F LuFull Text:PDF
GTID:2178360272468308Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Ad-Hoc network develops with the rapid development of wireless network. However, the security of Ad-Hoc network is still a great challenge, how to solve the security problem effectively will greatly affect the promotion and application of Ad-Hoc network. In this paper, the author conducts the research on the security problem of Ad-Hoc network.The security management of Ad-Hoc network is particularity due to openness of network, dynamic of network topology, no-center control distribution and resource limitation. These particularities include: no center node and nodes with low computing power, unable to use the traditional firewall technology and the authentication scheme based on the static allocation. In this sense, Trusted Computing based Security Management (TCSM) Model, a solution is introduced to realize security problem of Ad-Hoc network.TCSM Model is based on the idea of domain, the entire Ad-Hoc network is divided into different security domain, each security domain elect a domain authority (DA), which is responsible for authentication and key management of the security domain. The key aspects to TCSM Model are the definition of trusted computing, the election mechanism of DA is based on trusted computing. TCSM Model selects elliptic curve cryptosystem (ECC) as encryption algorithm, on which the key management system is based.In this paper, great emphasis is laid on the research of working mechanisms in TCSM model. The whole Ad-Hoc network can work in different security level: high security level and low security level. Each node in the Ad-Hoc network has two keys: register key and communication key. This paper pays more attention to working mechanisms, such as Initialization, nodes joining and leaving network, key registry and key agreement. Each node in TCSM Model should maintain several information tables, thus, the maintenance policy of information tables has great effects on the model. The performance of TCSM model is analysis from the aspects of feasibility and security.
Keywords/Search Tags:Ad-Hoc network, authentication, key agreement, trusted computing, ECC
PDF Full Text Request
Related items