Font Size: a A A

Mobile Ad Hoc Networks The Key Management And Solsr Of Agreement

Posted on:2008-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:F XiaoFull Text:PDF
GTID:2208360215450224Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Mobile Ad hoc network is a set of wireless mobile nodes with wireless Transceiver that can communicate with each other without any network infrastructure or central management. It is a temporary multi-hop ad hoc system. Mobile Ad hoc network can work independently or cooperate with Internet or Cellular Wireless Network. In this network, each node has the functions of router and host: as a host, a node should run application functions that face user; as a router, a node should run related routing protocols which means packets forwarding and routing maintainance according to routing protocols and lists. The routings between nodes are usually multi-hop. Because of the limited transmission range of wireless signal, two nodes that can't communicate directly should depend on the relay of some middle nodes. Thus Ad hoc network is also called as Multi-Hop Wireless Network, Self Organized Network, or infrastructureless Network. But because of it's characteristics such as wireless media, dynamic topology, distributed cooperation and limited resource, Mobile Ad hoc network is very vulnerable. The security problem has become a chock point on its way to be commercialized. The research of its security issues are still in its infancy. What this paper has done is described as follow:1. This paper proposed a specific implementations of distributed certification, illustrated the generation of private key, discovery and remove of Byzantine nodes and the process of renewing a private key share. The proposed method can distribute the risk of the whole network and resolve secure key management and related certification problems in some degree. Its security level depends that of RSA mechanism.2. Concerning attacks upon Ad hoc OLSR routing protocol, this paper came up with a SOLSR (Secure OLSR) protocol based on the theory of threshold. After analysising its security logically, this paper stimulated it to prove that its practical in real ad hoc network environment. Simulation results show that TC time delay caused by S OLSR is acceptable compared with original OLSR routing protocol.
Keywords/Search Tags:Mobile Ad hoc network, distributed key management, SOLSR
PDF Full Text Request
Related items