Font Size: a A A

Ad Hoc Network Key Management Research

Posted on:2011-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:W ShenFull Text:PDF
GTID:2178360305977270Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Mobile self-organization Ad hoc networks, as a special form of mobile networks, without having set up its unique network of facilities capable of rapid deployment, survivability and strong, and can be widely used in the battlefield command, disaster relief etc areas. In these typical applications, to ensure that network security is particularly important, while the key management is the central issue of security. Thus, Ad hoc networks, key management will become an important research topic.First this paper introduces Ad hoc network,as well as the network faces security problems . Through research discovered that it can greatly enhance in the effective management of safety. Ad hoc networks currently used in most key management scheme is based on the RSA algorithm, compare it with elliptic curve public key algorithm, in the same conditions of security, which has a key length of the short, low computation, etc. But in mobile Ad hoc network, each node, distributed computing, there is no such a trusted central, so it's difficult to achieve this central key management scheme. At the same time, the introduction of trusted networks will become a bottleneck, if the trusted is compromised, then the whole network will become paralyzed. In addition, the current key management scheme, commonly used on the key update is regularly updated, in Ad hoc networks that regularly update cycle to determine the size of well, if the cycle is too large, too many key leakage, the system safety will be attacked; if cycle is too small, frequent updates, the system will greatly decrease the efficiency, only to find a more suitable key management scheme replace.Against the issues raised above, this paper proposes a secure and efficient fully self-organization key management scheme for Ad hoc networks. In this scheme, use ECC algorithm substitute RSA algorithm is an alternative, in the same safe conditions, with better computing performance and shorter key length. Meanwhile, in order to the system security, the scheme remove trusted center bottlenecks, which fully distributed by each node to complete. Also the scheme used the dynamic dual-key update mechanism, not only improves the security of the system ,but also improved the efficiency of the system. Finally, the scheme analysis the safety and efficiency of the system, it has a safety, reliability, low computation and so on;meanwhile,simulation results show that it have high security.
Keywords/Search Tags:Ad hoc network, key management, secret sharing, elliptic curve, key update
PDF Full Text Request
Related items