Font Size: a A A

Research On The Provably Key Agreement Based Password Authencation Forad Hoc Network

Posted on:2014-12-20Degree:MasterType:Thesis
Country:ChinaCandidate:S J LiFull Text:PDF
GTID:2268330392973526Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Ad Hoc network is a self-organizing,non-centered, multi-hop wireless network,the entire network have no fixed infrastructure, it depend on cooperation with eachother and self-organization between limited transmission range mobile nodes tomaintain connectivity of network and data transmission. Ad Hoc network wasoriginally intended to meet the needs of the military applications, but with theresearch and development of communication technology and terminal technology, inrecent years it has been taken seriously in many other areas and applied to the specificscene. For example, means for disaster relief in the event of a flood, earthquake, thewired communication facilities is likely due to the destruction and can notcommunicate normally, Ad Hoc networks can quickly establish emergencycommunication network to ensure a successful rescue to complete the task ofemergency communication needs; used in harsh or remote areas of communication, inthese areas, Because of the cost, geographical and other reasons,it have not wiredcommunication facilities usually, the Ad Hoc network can solve the communicationproblems in such environments; For the distributed nature of the network environment,such as group meetings. Ad Hoc networks are easily accessible, flexible, and can beused to more scenarios and getting more concern in the field of research. However,because of its dynamic topology, limited resources, distributed and othercharacteristics such that the network is very fragile and more susceptible to a varietyof attacks and the security problems are more severe. As the basis for securecommunications, how to negotiate secure and be authenticated key in this networkbecome the focus of research. The outstanding advantages of password-based securityprotocols password is short, easy to remember and select save a lot of additionalequipment overhead. The focus of this study is based on password authentication andkey agreement of theAd Hoc network.The paper analyzes the current Ad Hoc Networks key agreement protocol basedon password authentication and found that although the design is simple, the amountof computation is smaller but can not fully meet the various security features of theAd Hoc network key agreement, in particularly, it can not resist password guessingattack and dictionary attack which is the most important attack in passwordnegotiation protocol,. The current agreement are flat network structure, the number ofnodes in the network are assumed constant, which is not in line with the actualsituation of the network.It can not meet the process of nodes joining and leaving.For the above, we have done the following tasks:1. We propose a new group key agreement protocol for Ad Hoc networks basedon password authentication.We make detailed security analysis and performance and compare security and efficiency with other similar protocols.The analysis andcomparison shows that the protocol enjoys many secure properties such as againstdictionary attack, against man-in-the-middle attack, against replay attacks, keyindependence, forward and backward security,et. Also, the protocol have lesscomputation and low computational complexity.2. We propose a Cluster-based Ad Hoc network password authenticated keyagreement protocol. We introduce the self-certified public key to ensure the reliabilityof the node identity and reduce the amount of storage. The key negotiation processbetween cluster and in the cluster is introduced detailed. The protocol also can meetthe node’s joining and exiting dynamically. The agreement not only to meet a varietyof security features can also support dynamic node joining and leaving, it’s suitablefor the dynamic changes in the network structure.We make security analysis, complexanalysis, and compare security and efficiency with other similar agreements.Theanalysis and comparison shows that the agreement is not only to meet a variety ofsecurity features, but also has the computational advantages.
Keywords/Search Tags:Ad Hoc network, key agreement, password authentication, key
PDF Full Text Request
Related items