Font Size: a A A

Ad Hoc Network Key Management Based On SCHD

Posted on:2012-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2218330338456910Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Because Ad Hoc have the features of lack of fixed infrastructure and rapid deployment, so, the security of it face the special difficulties. Key Management is at the core of security system of Ad Hoc, and plays a fundamental role. This paper makes a deep research of the current Key Management programs, and especially the cluster-based Key Management. In the research, this paper pulls in the fundamental mechanism of Node mobility,classified pre-configured,Subsequent Cluster Head Domain(SCHD),task dispatch, on the base of them, according to the position relationship of nodes, this paper develops four kinds of authentication and key management protocol. Considering the coral function of cluster head, this paper introduces SCHD, which is the distributed image of cluster head and memory the information of cluster in redundancy. Besides, node mobility exchange public key certificate and establish trust relationship, which is considered as fundamental mechanism of enhanced network extension and optimal network performance. In term of the increase of mobile terminal's computation and memory, this paper introduce classified pre-configure mechanism, which not only make different node tend to homogenization in physics, but also, make them enhance the capacity of execution of heterogeneity task. In this paper, task dispatch which is act as gateway of task dispatch, whose function is to determine the position relationship of nodes, then decide the relevant authentication and key management. In different programs, according to the trust value, the principals select the node as CA from SCHD. When the initiator requests to CA, the CA node actively pushes the information of initiator to responder. This paper make use of strand space to verify the authentication and confidential of protocols base on different programs. The Key Management protocol this paper to maximum extent avoid the failure of single node,efficiently defend the attack of passive flow analysis,simplify the key management of group,enhance network extension,optimize network performance.
Keywords/Search Tags:Ad Hoc, node mobility, classified pre-configured, SCHD, task dispatch, active push
PDF Full Text Request
Related items