Font Size: a A A

Security Policies In Wireless Mobile Networks, Ad Hoc Research

Posted on:2005-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:L DuanFull Text:PDF
GTID:2208360122481731Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Generally, wireless networks include networks that have center and have not center. The first one needs fixed basic infrastructure, then the second one mainly indicates wireless mobile ad hoc networks. It dose not need fixed infrastructure and can automatically form network. Compared with the network has center, ad hoc networks is more flexible, more vigorous and less wasting. So it has well foreground of application. Each node in ad hoc has two part : router and host. As host mobile node must run application program belongs to user; as router it need running router protocol. Every node may "freewill time, freewill place" enters network or leave. Since nodes have sufficient activity, the topological framework of network easily change and the security is awful, which block ad hoc networks' s developing and application.So, it urgently needs safe settle scheme that fits ad hoc networks.The thesis focused on security strategy research of authentication And wish to designing abroad adaptability, finer security and higher efficiency authentication system .Mainly finished 3 parts work:1) Designing and realizing authentication system based PVSS. That introduces PVSS idea in primary authentication system based rely partake. The system includes: system initialization, issueing certificate, retracting certificate and updating certificate;2) Designing and realizing key management system based PVSS. The system includes: distributing system private key, distributing private key part and updating private key part;3) Analysing performance through APE simulation. The keystone is issueing certificate.
Keywords/Search Tags:ad hoc networks, authentication, key management, PVSS
PDF Full Text Request
Related items