Font Size: a A A

Wireless Ad Hoc Network Key Management Program

Posted on:2007-12-26Degree:MasterType:Thesis
Country:ChinaCandidate:Q XuFull Text:PDF
GTID:2208360185976973Subject:Operational Research and Cybernetics
Abstract/Summary:PDF Full Text Request
Wireless Ad hoc networks are new type of networks in which a collection of mobile terminals with wireless transmitters cooperate with each other. It is an important part in the research area of wireless communication. Due to its easiness of construction and host mobility, Wireless Ad hoc networks will be widely used in the real world. However, for the inherent features of this type of networks, it suffers more security threat than conventional networks, and the security of wireless Ad hoc networks is receiving increasing attention. As the fundamental problem of network security in wireless Ad hoc networks, key management has been the main issue.In this paper, emphasis is put on the design of secure and efficient key management and transmission schemes for wireless Ad hoc networks. We first analyze the adversary types, security threats and relating security requirements based on the structure and features of wireless Ad hoc networks. The status quo of the current research on wireless Ad hoc networks security is presented. The main contributions as well as their deficiencies of some existing protocols for key management in wireless Ad hoc networks are investigated. Then some new theory and technology on cryptography in recent years, such as identity-based cryptography, certificateless cryptography, verifiable secret sharing, blind signature and short signature are used as basic tools. And they are combined with existing achievements in key management in Ad hoc networks. As the main contributions, two efficient key management and transmission schemes for wireless Ad hoc networks are put forward. The properties, security and cost of communication and computation of the two schemes are analyzed in detail.Compared with the existing other schemes, the new schemes can more effectively adapt the features of dynamic, loss of Trusted Authority and limitedness of networks resources in wireless Ad hoc networks. The nodes' keys can be generated in a full distribution manner and can be transmitted through public channels securely. The new schemes satisfy the security requirements on key in wireless Ad hoc networks, as well as economize the networks resources and the cost of computation and communication, hence enhance networks performance.
Keywords/Search Tags:Wireless Ad hoc Networks, Key Management, ID-based Cryptography, Certificateless Cryptography, Threshold Secret Sharing, Secure Transmission
PDF Full Text Request
Related items