Font Size: a A A

Research On Key Management And Certificate Revocation For Ad Hoc Networks

Posted on:2010-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:C LiuFull Text:PDF
GTID:2178360272982366Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
As an infrastructureless radio network, the diverse applications of Ad Hoc network in many different scenarios such as battlefield and disaster recovery have made it being researched by many different institute and experts. However, Ad Hoc network is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. The infrastructureless and the dynamic nature of these network demands wide and deep research in different aspects of itself. To provide security service for Ad Hoc network is one of these researches.The dissertation mainly focuses on the key management and certificate revocation of Ad Hoc, The contributions of the dissertation are outlined as follows:(1) A distributed algorithm of certificate revocation for Ad Hoc is presented in this paper. The algorithm uses the revoking case and weight record matrix A(T W) to describe revoking relationship and creditability of network nodes. The weight of node is updated continuously by iterative equation in network running. Furthermore, as invalid nodes are revoked, the weight of normal nodes can be recovered gradually with the operation of network. It is very suitable for Ad Hoc.(2) Another algorithm of certificate revocation for Ad Hoc based on the model of distributed CA authentication is presented, in which one-way hash chain is used to achieve data source authentication of message node accused, while an accused matrix Aij(T) and quotient vector W(T) are used to accomplish certificate revocation for malice node. Furthermore, we considered the effect of number of malice accused on its own accusation ability, which prevented malice nodes from accuse valid node's certificate together, and improved the security of the system.
Keywords/Search Tags:Ad Hoc, Key management, Certificate revocation, Distributed algorithm
PDF Full Text Request
Related items