Font Size: a A A

The System Structure And Key Management Of Tactical Internet

Posted on:2013-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:W FangFull Text:PDF
GTID:2248330377455248Subject:Information security
Abstract/Summary:PDF Full Text Request
Since the U.S. military firstly using the Tactical Internet in the first "Iraq war", the world also raises the upsurge of research and application on the Tactical Internet. It is a wireless network which is non-center, self-organization and multi-hop based on Ad Hoc Networks. As this kind of network, the Tactical Internet has some good characteristics of no need to prior to set up a network infrastructure, rapid deployment, survivability and so on. So the Tactical Internet has broad application prospects.First this paper defines the basic concept of the Tactical Internet, and combines with the current research status, especially the Tactical Internet structure of U.S. Military and then discusses the functional applications, the underlying technology and Ad Hoc Networks. Then this paper puts forward a three-tier layered architecture include division, group and even and prepares for the key management in the following sections.The features that the large quantity of the third tier of even-level units, join and leave frequently and the relatively simple communications equipment can be seen from the architecture of the Tactical Internet. The second part mainly proposes a new secret sharing scheme based on the ID encoding tree to the key management of the ground Tactical Network in the Tactical Internet.This paper designs a kind of multi-fork ID encoding tree based on the features about limited energy consumption and highly mobile, and compares with other forms of coding to prove its superiority. Then this paper combines the ID encoding with cylindrical secret sharing and analyzes the safety and energy consumption of this program by simulating.This paper studies the Tactical Internet and its architecture has a practical value. The key management scheme is expected to be applied to the ground tactical and platoon-level tactical units and offers design and reference in our military communications network.
Keywords/Search Tags:Tactical Internet, System Structure, Fork coding tree, secret sharing, KeyManagement
PDF Full Text Request
Related items