Font Size: a A A

Research On Authenticated Group Key Agreement For Ad Hoc Networks

Posted on:2010-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:G J LiuFull Text:PDF
GTID:2178360272982365Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
As an infrastructureless mobile multi-hop network, Ad Hoc networks are easily accessible, efficient, and can be used in many environments, such as rescue, meeting, and battlefield, adventure, monitoring the goal of occasions in dangerous or remote environments. It can also be used to expand the ends of cellular network. Therefore Ad Hoc networks turn out to have important military significance and broad prospects for commercial applications. However, the features of limited bandwidth, low power nodes, dynamic topology change, and non-center infrastructure characteristics make Ad Hoc networks confronted with the same as and even more serious security problems than traditional wireless networks, and as the basis for secure communications, the security of group key agreement protocol is one of urgent security issues for Ad Hoc networks.The main contributions follow below.1. Construct a fast authenticated group key agreement protocol, which is suited for large dynamic Ad Hoc networks and enjoys against man-in-the-middle attack and effectively reducs the cost of communication.2. Propose an improved identity-based croptosystem, on which a novel 4-round authenticated group key agreement protocol, which is against the problem of too large computation about ID-based group key agreement protocol, is provided. The protocol satisfies all known security requirements. It reduces pairing computations and enjoys fewer computations than other protocols.3. In order to further reduce the computational cost and communication overhead of the above protocols, a password spanning tree with valve-value and its building are firstly given, then an ID-based and password Ad Hoc authentication group key agreement protocol is contructed. The protocol has efficient communications, less computations, and better ability to adapt instable communication links.
Keywords/Search Tags:Ad Hoc, Key Management, Key Agreement, Group key, Authentication
PDF Full Text Request
Related items