Font Size: a A A

Optimization Of The Trust Model And Research Of Key Management Routing In Ad-Hoc Network

Posted on:2014-06-09Degree:MasterType:Thesis
Country:ChinaCandidate:M LiFull Text:PDF
GTID:2268330401971910Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Ad Hoc network is currently the research focus in the field of mobile communications, and is able to meet the needs of future of personal communications network in every where. Currently, the Ad Hoc network research focuses on routing protocols, basic networking technology and security mechanisms, especially the secure transmission research of information as the current hot spots.Ad Hoc network transmission via wireless signal, anyone can receive the signal, so it is easily eavesdropped by the enemy. The wireless channel is vulnerable to be injected by false packet. Mobile node due to the factors leading to the environment is very fragile, easily captured.The information such as the key of the node is intercepted, then the node back to the network, destroyed the whole network. So how to establish a sound mechanism of trust and key management become the focus of the study of Ad Hoc Networks.In this paper, studying based on several currently popular trust models, proposes an improved clustering trust model, which is in line with the Ad Hoc network is scalable, dynamic. Node trust value calculated by the method of active trust, can dynamically update the trust value, take the initiative to find a bad node function. Trust management is implemented through the main cluster head and sub-cluster head, the node does not participate in the management of trust, and each node all have the trust value table of the cluster-wide repository.In addition, based on the trust model, designs to establish the identity-based key management system. This certificate is based on the elliptical encryption technology, and the generated key pair (public key and private key), key management is stored and updated by the node itself, not by the cluster head, so the cluster head node does not participate in key management. Possible to reduce the burden of the cluster head (both responsible for routing, but also is responsible for the key management), so that the topology of the network to maintain a relatively stable state, to prevent network routing often in updated status.Finally, using NS2simulation platform to simulate the model, comparing and analyzing the result in the network performance.
Keywords/Search Tags:Mobile Ad Hoc Network, Identity-based Clustering Model, DynamicSubject Trust, Key Management
PDF Full Text Request
Related items