Font Size: a A A

Research On Security Schemes In Ad-Hoc Network

Posted on:2010-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:W T WangFull Text:PDF
GTID:2178360278965687Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Ad Hoc also know as mobile self-organizing network.Formed by a group of independent wireless nodes or teminals that cooperated with each other, the network independent of the common network infrastracture.Running in the network, all the notes have autonomous self-organizing, dynamically changing topology, distributed moving and limited bandwidth.Each node can move freedomly, and acts as terminal host & router at the same time,it takes charge for transmiting grouping information and updating the route of reaching to the other note.Between the notes,wireless communication technology is adopted, because of the disturbed signal,the distance of wireless communication is limited,so multi-hop is adopted from note to note.Each node joins in or break from a certain self-organizing network probably when it is moving freely. The dynamically changing topology bring flexible characteristic to the MANETS network,but it's also bring security threats at the same time,such as wire tapping, fabricate ID, playback, sophisticate message,QoS.In this paper, we chosed network security as a question for discussion, labored characteristic and security threats of the network, discussed the security target, application field, existing mechanisms now existent problems and research direction at present. The key management scheme is a guarantee of foundation of Ad hoc network security, so key management schemes are emphased in this paper. Analysising and comparing the schemes presently, pointed out their strongpoints and shortcomings, and indicated future research aspect. Am at the characteristic of the AD HOC network, when appling threshold password, distributing CA, key managemen and key sharing schemes, we proposed a new effective ID-based completetly distributional key management scheme. Solve the production, memory, management of private key, and also strengthened the security of AD HOC network. Here I also summarize the technology of authorization, and the schemes of authentication, authorization, signature and Non Repudiation. At last the paper presents summarize, and also points out the prospect of the future.
Keywords/Search Tags:mobile self-organizing network, key management, signature, security, non repudiation
PDF Full Text Request
Related items