Font Size: a A A

Research And Design On Ad Hoc Group Key Agreement Scheme Based On ECC

Posted on:2010-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y L WangFull Text:PDF
GTID:2178360275480593Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The multicast key management issues are the focus of attention in the multicast security problems, collaborative operation of producing group key will consume much computation cost, in order to reduce the influence that exerted on the networks the efficient key management scheme with lower computation cost is needed urgently. The multicast key management on the mobile Ad hoc networks is more complex than the wired networks and the general wireless networks, this is determined by the characteristics of mobile Ad hoc networks. Because of the lack of adequate physical protection, the packages that transfer on Ad hoc networks are completely exposed. On the other hand, there are not any central nodes in Ad hoc networks, the computing power of nodes is not strong, so the traditional encryption and authentication mechanisms can not be applied to Ad hoc networks directly. Because of the dynamics of the topology, the trusted relationship among group members and the data that transmits on this networks, the traditional schemes that based on databases and file systems are no longer applicable. The traditional firewalls also can not be deployed because of the blurry network boundaries. These shortcomings make the Ad hoc networks vulnerable to a variety of attacks, which destroys the normal communications, so that group communication security is facing enormous challenges.In order to effectively deal with the security threats to communications , we focus on the establishment of a fit Ad hoc group key management scheme. The new scheme ensures the security of group communication through the negotiation and the dynamic update of the group key. The traditional group key management schemes that based on RSA consume more computation, communication cost and storage overhead than elliptic curve cryptography, so we introduce the elliptic curve cryptography in the new group key management scheme. The elliptic curve cryptography will effectively reduce the calculation cost of group key agreement. Under the conditions of the same secure intensity the key length that is required by elliptic curve cryptography is much shorter than RSA, which means that the new scheme requires smaller storage, lower transmission bandwidth, less hardware implementation and lower power consumption. The new safe and effective scheme is designed to update the group key when dynamic event occurs, our scheme implementes the forward security and backward security. The safety of the new scheme is based on the difficulty of the elliptic curve discrete logarithm problem, so our scheme achieves a high security.
Keywords/Search Tags:Ad hoc networks, Group key, ECC, Forward security, Backward security
PDF Full Text Request
Related items