Font Size: a A A

Research Of Key Management And Authentication Mechanisms For Ad Hoc Network

Posted on:2014-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:S W XuFull Text:PDF
GTID:2268330392464018Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Ad Hoc network is a temporary autonomous system without any fixed infrastructure.By virtue of its characters including networking flexible, fast, efficient and mobility, AdHoc network can be widely used in military operations, disaster rescue and manyoccasions where is inconvenience laying network facilities. But the characters of mobility,no center and openness of the own channel make Ad Hoc network is easier to be attacked.Even, the security problems are much more severe than traditional network. On the otherhand, due to the characteristics of Ad Hoc network, the existing security mechanism isdifficult to completely apply to it. Therefore, research and develop security mechanismfor Ad Hoc network is of great significance for developing Ad Hoc network.Encryption and authentication technologies are two effective methods to protect thesafety of Ad Hoc network. In Encryption technology, key management is one of theprimary problems needed to solve. Thus, in this dissertation we research the keymanagement and authentication mechanism. The main work of the dissertation is asfollows:(1) Proposes a mutual-healing key management scheme for Ad Hoc network. Thescheme is based on cluster structure and mainly adopts access polynomial and two-wayhash chain technologies etc.. It achieves safe and efficient key distribution and keyself-healing and mutual-healing for node. When nodes join or leave the cluster, thecluster head can be efficient update of the session key. The new scheme has goodsecurity on forward security, backward security and resistance to conspiracy attack. Onperformance, the scheme has advantages of less computation and communicationoverhead.(2)By analysing Mun et al.’s scheme, we point out that the scheme is weak onanonymity and confidentiality when mobile user wants to authenticate. On the basis ofMun et al.’s scheme, proposes a new anonymous authentication scheme. The newscheme solves the security issues in the previous scheme and provides the anonymity andconfidentiality for mobile users. It mainly uses the secret random numbers andpseudo-identity technologies, etc. Further, we realize the two schemes and the experimental results and analysis show that the new scheme not only enhances thesecurity, but also is more efficient than the previous scheme.(3) By analysing Das et al.’s scheme, we point out that the scheme can not resistsmart card attack and is not efficient on computation and memory performance. On thebasis of Das et al.’s scheme, proposes a new authentication scheme for hierarchicalwireless sensor network. The scheme presents a new way of session key generation andauthentication, which solves the smart card attack in previous scheme and makes theauthentication among user, host and sensor is more rational and effective. Further, wealso realize the two schemes and the experimental results and analysis show that the newscheme enhances the security, promotes computation performance and reduces thedemand for storage capacity in smart card.(4) We simulate key distribution and node join progress of key management schemeby NS2simulation software and test node’s join time and computation time of clusterhead for distributing session key. By comparing with Dutta et al.’s scheme, thesimulation results show that our scheme has lower join delay time and higher efficiencyin computing session key.
Keywords/Search Tags:Ad Hoc network, key management, two-way hash chain, authenticationmechanism, anonymous authentication, real time data
PDF Full Text Request
Related items