Font Size: a A A

Threshold Authentication Schemes Based On The Elliptic Curve For Mobile Ad Hoc Network

Posted on:2008-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:J J XuFull Text:PDF
GTID:2218360212476278Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
From the prosperity of the research of mobile ad hoc network in the 90's of 20th century to the research tide of wireless sensor network (WSN), flourishing in the 21st century, the mobile self-building network is gradually growing from a tiny branch of the wireless communication field to a relatively independent field. In accordance with the profoundity and maturity of the research, the attractive application prospect of the mobile self-building network is approaching people's life.However, because of the mobile and self-building dynamic network topology characteristics, the security (including the availability of the node, the confidentiality and integrity of the data transfer, the authentication of the nodes and non-repudiation, etc) are extremely fragile in comparison with the LAN. In the security category, key agreement and authentication are most basic and crucial mechanisms. They cooperate together to ensure the reliability of the nodes and that the communication is performed among the legal nodes.In this paper, the background of the research is firstly introduced, including the basic knowledge and characteristics of mobile ad hoc network and its security needs and aims. And some analyses are performed for the trust models. Afterwards, related mathematics and cryptography knowledge are inducted in the following chapter, because in this paper, a totally new algorithm is proposed, which is based on wide and profound mathematical knowledge. In terms of cryptography, the main computation and algorithm of the basic concepts and detailed problems of the elliptic curve cryptography are introduced, and the comparisons of the advantages and disadvantages between the elliptic curve cryptography and other cryptography are performed. Then, supported by the existing mathematical foundation, a fire-new threshold authentication scheme based on the elliptic curve cryptography for the mobile ad hoc network is proposed in this paper, from the introduction of the scheme and the system design to the initialization of the system and the selection of the parameters. In terms of the core algorithm, detailed processes are described, including the generation of the sub authentication and the composition of the final authentication certificate. The whole scheme is correct and verifiable and the proofs of the scheme are given. Based on that, we provided the security and complexity analyses of the algorithm and finally verified the correctness of the scheme using the simulation system.This scheme integrated the public key cryptography and threshold signature theory, having the advantages of low complexity, high security, acentric topology, verifiability and robustness of the threshold authentication, which is especially appropriate for the characteristics of mobile ad hoc network, such as dynamic self-building, multi-hop, low power supply, easy compromise, without center node and equivalent node topology, etc.
Keywords/Search Tags:Mobile ad hoc network, elliptic curve cryptography, threshold authentication
PDF Full Text Request
Related items