Font Size: a A A

Research Of AD Hoc Network Based On ECC And Distributed Key Update Scheme

Posted on:2013-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:W BaiFull Text:PDF
GTID:2248330374970355Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Ad Hoc network is multi-hop, self-organized and temporary wireless communication network composed by a plurality and random mobile nodes. It can be fast and flexible paved on certain occasions, and have self organization and strong survivability. It also can guarantee the ability that is not affected and the normal operation of the network even if some nodes are destroyed or lost. Hence, People pay more and more attention to it because of its broad application in the military, emergency rescue and disaster relief and commercial fields. However, Ad Hoc network’s many inherent characteristics make it very easy to become the object of attack. The traditional, mature network security measures cannot be applied directly to the Ad Hoc network. Therefore, the network vulnerable security restricts its wide application.Key management system of Ad Hoc network is one of its important research directions. Elliptic curve cryptosystem is based on the problem difficulty that the elliptic curve discrete logarithm and is one of the important research topics in current cryptography. In the digital signature and authentication, the process of security and performance has its own unique characteristics and advantages. Combined with the elliptic curve cryptography and Ad Hoc network is better to study Ad Hoc network.This paper discusses the Ad Hoc network application field and system structure, summarizes the network security target and analyses Ad Hoc network exist security risks from the physical structure, routing protocol, key management. We focus on the key management scheme of classification and select distributed key management scheme as the focus of the study. According to key algorithm selection problem we introduced the RSA algorithm and the Elliptic Curve Cryptography, and analyses their advantages and disadvantages.Based on Shamir scheme we establish a new distributed key management application plan combined with Elliptic curve cryptosystem and characteristic of Ad Hoc. Furthermore we establish three layers structure of experimental platform by jQuery, design and simulate Ad Hoc network and implement Shamir, ECC algorithm and so on. Finally we realize the key management scheme and verify its feasibility.
Keywords/Search Tags:Ad Hoc network, Network security, Elliptic curvecryptosystem, ECC, Shamir scheme
PDF Full Text Request
Related items