Font Size: a A A

Research On Authentication Of Wireless Mesh Network Based On Secure Multi-party Computation

Posted on:2011-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:L F WeiFull Text:PDF
GTID:2178360305462523Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless Mesh Network (WMN) is a new wireless network technology that is just emerging in recent years. While resolving the "Last One Mile" problem of network access properly, wireless mesh network greatly contributes to the convenience of wireless network deployment and wireless terminal access. The new feature of WMN, however, also poses a new challenge to the security and adaptation of WMN, especially the secure authentication of WMN. This thesis focuses on the application of Secure Multi-Party Computation (SMPC) theory in secure authentication protocol of WMN, and proposes three secure authentication protocols of WMN based on SMPC. The general research way and results of this thesis are as follows:1. A common authentication protocol of wireless mesh network based on private key encryption system is presented from the view of one-way and mutual authentication after the analysis of authentication protocol of wireless mesh network and research status on secure multiparty computation. There's a key research on the secret share of secure multiparty computation and the share trait of Prepared Share of Key (PSK). Combing of the (t, n) threshold share algorithm, a PSK one-way authentication protocol of wireless mesh network is designed by distribution and reconstruction using Lagrange interpolation polynomial. Detailed implementation of the authentication protocol in wireless mesh back network authentication and sub network authentication is provided. Finally, a comparison with current related protocols on security and validity indicates that the authentication protocol proposed in this thesis has an advantage in amount of public information needed security and additional overhead.2. There is a research in applicability of mutual authentication protocol in WMN.Combined with the feature of secret transmission of Oblivious Transfer (OT) and the uniqueness and co-ncealment of commitment in SMPC, a Mutual Authentication Protocol based on Oblivious T-ransfer (OT-MAP) and a Mutual Authentication Protocol based on Key Commitment (KC-M-AP) are designed separately. The proposed protocol shows certain advantages compared with other related schemes on computation, storage and communication overhead, though security decreases a little. The results indicate the proposed protocol will meet the needs of WMN mutual authentication preferably.3. A test scenario and its simulation experiment of WMN authentication protocol is presented at last, and also the analysis to the empirical datum and the simulation result. Compared with current related protocols on TEK update success rates and time-delay, and the result shows that the proposed protocol has a higher success rate and lower time-delay when terminals joining or withdrawing the WMN. The proposed protocol shows certain advantages over other schemes, though computational costs increase a little. The results indicate the proposed protocol will meet the needs of WMN authentication preferably.
Keywords/Search Tags:WMN, authentication protocol, SMPC, network security
PDF Full Text Request
Related items