Font Size: a A A

Ad Hoc Network Portion Of The Distributed Key Management And Authentication Scheme

Posted on:2012-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2218330371951813Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Ad Hoc network does not rely on any fixed or stationary network infrastructure, which is characterized by rapid expansion, high damage-tolerance and self-organization, and is widely used in the field of military and civilian applications. However, because of its characteristics such as dynamic topology, open medium, and constrained resources of nodes, Ad hoc network is vulnerable to malicious attacks, it is very important to ensure its safety, while the key management and the authentication are the central issue of network security.In this paper, the partial distributed key management and authentication of Ad Hoc network have been deeply studied, combined with routing technology and verifiable threshold secret sharing mechanism, a new scheme of key management and certification is proposed. This scheme has a good performance through theoretical analysis and simulation experiments, and it is mainly shown in the following respects:(1) Improve the response speed of the node's authentication request. Through introducing routing mechanism to maintain a special server group, the scheme makes the authentication request be rapidly responded by the nearest server node, and has a good performance in the certificate update delay.(2) Enhance the network's usability and security. In the initialization of network, using the RSA sharing key generation mechanism, server nodes don't need offline configuration of Certification Authority, which improves the usability of the network. In the process of key distribution, using the verifiable threshold secret sharing mechanism, server nodes can verify whether the part of private key is correct or not, which improves the safety of the network.(3) The system has forward security. When a new node joins the network, the private key of system is updated, making the new node joining the network not restore the previously encrypted information, even if it has attacked "enough" server nodes. Thereby it ensures the forward security of system.
Keywords/Search Tags:Ad Hoc network, secret sharing, key management, authentication
PDF Full Text Request
Related items