Font Size: a A A

The Research And Design Of Key Management Scheme For Ad Hoc Network

Posted on:2014-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z L LiuFull Text:PDF
GTID:2248330398972234Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the mobile computing and the wireless communication technology, there comes a new kind of network—the wireless Ad Hoc network, which is also named as mobile self-organized network or wireless multi-hop network. This kind of network is a temporary multi-hop autonomous system consisting of a group of mobile terminals with wireless receiving and transiting devices. Compared with the traditional network, this kind of network has some special Characteristics such as no-center, shelf-organized and quick and easy deployment. The wireless Ad Hoc network can be used more and more widely, especially in the special environment such as battlefield and post-disaster relief. However, the special characteristics of this kind of network also make it more vulnerable to security threats than the traditional network. Besides, the key management schemes for the traditional wireless network can’t work well in the Ad Hoc network, because of its excessive dependence on the trusted third party. So, to design an effective and secure key management scheme for the wireless Ad hoc network is very important.In this paper, a new cluster-based key management scheme suitable for wireless Ad Hoc network is proposed, and the main work of this paper is as follows:1. Do some research and analysis on the existing key management scheme for wireless Ad Hoc network, and gives a fair summary of these schemes.2. This paper introduces some theory on the key management scheme for wireless Ad Hoc network, including the cryptography as well as the topological structure of wireless Ad Hoc network. 3. This paper proposes a key management model with double-layer topological structure. And on the basis of this model, a key management scheme for wireless Ad Hoc network is designed, which consisting of several algorithms such as system initialization, node joining and leaving, session key agreement, key generating and renewing.4. To indicate the scheme proposed before being suitable for wireless Ad Hoc network, the analysis of security and performance as well as the comparison with other key management schemes for Ad Hoc network is made.
Keywords/Search Tags:wireless Ad Hoc network, key management, identity-based encryption, session key agreement, secret share algorithm
PDF Full Text Request
Related items