Font Size: a A A

Research On Distributed Authentication Scheme For Mobile Ad Hoc Networks

Posted on:2011-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:J GuanFull Text:PDF
GTID:2178360302494732Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc networks offer convenient infrastructureless communica- tion over the shared wireless channel.However,the nature of mobile Ad Hoc networks makes them vulnerable to security attacks.By analyzing Ad Hoc networks,this paper combines previous ideas and brings forward a distributed authentication scheme with security algorithm for secret share distribution and a authentication mobile by cluster-based architecture.First of all, this thesis introduces the background, the characteristic of Ad Hoc networks and problems of security in Ad Hoc networks.Several trust schemes for reinforcing security of Ad Hoc networks are analyzed in detail and the advantage and disadvantage of the schemes are pointed out. And on this basis, the main contents of this thesis is established, the correlative cryptosystem and the basic technology of certification is introduced.Second, the thesis introduces a multi-layer distributed authentication scheme which adopts shamir threshold secret sharing technology,threshold signature technology that derived from threshold secret sharing,multi-layer distributed technology and monitoring misbehavior of neighbors by analyzing and comparing the different typical authentication model, so the scheme has the functions such as the help of neighbor,managing of secure key,authentication services and so on. The scheme focusing on the security issue of the service node, it carried out double auditing towards the nodes that applied for secret shares by the help of the agent neighbor node, then it provides the certificate services.Third, after the analysis and comparison for the structure of the Ad Hoc networks, an authentication service scheme in cluster-based architecture is designed that focusing on the security and scalability of the scheme. Then the initialization of the networks,the changes of the network structure as well as the related algorithms of the certification services for the network nodes at all levels are described in detail.Finally, the paper have an experimental analysis in older to validation the improvements of the efficiency and scalability based on the theoretical analysis for the safety and feasibility of the schemes.
Keywords/Search Tags:Ad Hoc networks, Distributed authentication, Secrets sharing, Digital signature, Cluster structure
PDF Full Text Request
Related items