Font Size: a A A

Location-Similarity-Based Key Agreement Scheme For Mobile Networks

Posted on:2015-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2268330425989052Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of internet technology, smart-phones have been becoming an important part in our daily life in recent years. Besides of exchanging voice and text messages, people are using smart-phones to share their interested multimedia information, such as video and picture information. However, communications among smart-phones are facing a security threat that the shared information can be captured by the attacker owing to the lack of effective security mechanism. How to secure the communications among smart-phones is one of the most important problems should be resolved. In this paper, we particularly focus on designing two dynamic key agreement schemes based on the problem mentioned above, i.e. LSKA and OLSKA, in order to secure the communication among smart-phones.Firstly, we propose a location-similarity-based key agreement scheme (LSKA), by combining the similarity of location information with fuzzy vault scheme. Meanwhile, a specific description is given to the key agreement scheme that includes five steps: Initialization, Feature Generation, Polynomial Construction, Coffer Creation and key Generation. Secondly, we analyzed the LSKA theoretically from three aspects, i.e. Chaff point security, Message exchange security, Successful key agreement probability. And we can conclude from the analysis results that the receiver can achieve the key with a high probability, however, it is difficult for an attacker to obtain the right key. Thirdly, through the numerical results obtained by MATLAB simulation, we illustrate that the analysis results are coincide with the experimental results, give the method that how to set a certain parameter, and discuss the influence in LSKA made by different environments. Finally, an LSKA prototype is implemented on android platform and it can always running successfully.Motivated by the idea of ordered-feature, we then proposed a new key agreement scheme i.e. OLSKA (ordered-location-similarity-based key agreement scheme) on the base of LSKA. A concrete description is given in this paper, i.e. Initialization, GPS Data Collection and Ordered, Coffer Creation, Feature Generation, Key Construction by Receiver, Key Construction by Sender. Secondly, we give an analysis to the OLSKA theoretically from two aspects, i.e. Coffer security, Message exchange security. Meanwhile, we found that the OLSKA can resistant against brute force attacks. Thirdly, through the numerical results obtained by MATLAB simulation, we discuss the influence in OLSKA made by different environment, and the method that how to set a certain parameter is given at the same time. Fourthly, an OLSKA prototype is implemented on android platform and it can always running successfully. Finally, we compare OLSKA with LSKA, the results show that OLSKA is always better than LSKA.
Keywords/Search Tags:Key Agreement, Smart-phone, Location Similarity, GPS Data, LSKAScheme, OLSKA Scheme
PDF Full Text Request
Related items