Font Size: a A A

Authentication Code For Network Coding Based Secure PUMA Protocol

Posted on:2011-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:J XieFull Text:PDF
GTID:2178360305483024Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the development of science and technology, wireless technology has been widely applied in various networks. On the one hand, the performance and security are the most two important factors in ad hoc network. On the other hand, it has been proved that network coding can provide significant benefits to wireless networks, but this promising technology is very vulnerable to pollution attacks. Currently, there are only a few ad hoc network protocols based on the secure network coding, so it's urgently demanded to develop the secure network coding protocols based ad hoc network.This paper proposes a new secure PUMA based on network coding—ACNC-SPUMA (Authentication Code for Network Coding Based Secure PUMA Protocol) to defend against the pollution attacks after studying the advantages and disadvantages of PUMA protocol, the characteristics, structural system and the security challenges in ad hoc network, and the challenges in network coding. This proposed protocol is aimed to improve PUMA, so as to perform on the network based on authentication code for network coding and then and achieve the aim of improving efficiency and also preventing pollution attacks in network coding.To confirm the network performance of this new ACNC-SPUMA protocol, this paper uses network simulation platform NS2 to simulate this new protocol. The results of the simulation on NS2 show a better network performance. Compared with PUMA, ACNC-SPUMA has enhanced the security of PUMA while improving efficiency and reducing energy consumption.The Innovation of this paper is in the following three aspects:(1)From the point of the practicality and security of PUMA, studied the advantages and disadvantages of PUMA, and introduced the security challenges in PUMA.(2)Compared several published signature schemes:there are various signature and authentication schemes for network coding, this paper chose a suitable authentication scheme for network coding based PUMA protocol to guarantee the security of PUMA.(3) Aims at the security of network coding based PUMA, this paper proposes a new secure PUMA based on network coding—ACNC-SPUMA. (4) NS2 has been used to simulate the new protocol. The simulation result shows that ACNC-SPUMA has enhanced the security of PUMA while improving efficiency and reducing energy consumption, it has a better network performance.
Keywords/Search Tags:Ad hoc networks, network coding, security, authentication, PUMA
PDF Full Text Request
Related items