Font Size: a A A

The Research And Implemention Of Wireless Conference Key Protocol

Posted on:2011-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z J DaiFull Text:PDF
GTID:2178360305961892Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid progress of wireless mobile communication, wireless conference call has become a research hotspot due to its economy, convenience and uncertain location of the participants. The ability to protect and authenticate the identity of participants in wireless conference call application is critical. However, due to the mobile devices typical with constraints on available power consumption, bandwidth and storage limitation, most of these existing authenticated key agreement protocols are not suitable for wireless mobile communications. So, it is essential to study in designing secure protocols for wireless networks.In this thesis, a new protocol presented for wireless conference key setup integrates symmetric key encryption, hashing and (t, n) secret shared. To start a new conference, at least t participants have to be active and broadcast their shares. This protocol provides mobile participants with user identity anonymity and authentication during the conference call. According to the importance of the meeting and the connection of the wireless network, the chairperson can set an appropriate value for its corresponding t. This protocol has good availability and wider application.Finally, in the Windows environment, we show the programs developed by J2ME under Eclipse, which have implemented this new protocol.
Keywords/Search Tags:conference call, (t,n) secret shared, anonymity, authentication
PDF Full Text Request
Related items