Font Size: a A A

Research On User Authentication Protocols For Emergency Mobile Ad Hoc Networks

Posted on:2015-08-06Degree:MasterType:Thesis
Country:ChinaCandidate:H Q FanFull Text:PDF
GTID:2298330422984555Subject:Transportation engineering
Abstract/Summary:PDF Full Text Request
Faced a major earthquake, floods and other natural disasters, large accidents, eventerrorist attacks and other special circumstances are happened. Various organizations will sendpersonnel to deal with the event immediately. In this case, the establishment of emergencycommunications is one of the most important things. Mobile Ad hoc network has become ahot research topic in wireless communication networks in recent years. Although Ad hocnetwork built need not to rely on the basis of the implementation, the node of the formationnetwork can move freely, and the network can be easy to build characteristics. Meanwhile, Adhoc networks are very vulnerable to be attacked by a lot of network. Nodes of the joined Adhoc network authentication can effectively prevent unauthorized users access the network,and ensure network security.Many domestic and foreign research institutions Ad hoc network security issuesconducted in-depth research. A series of network authentication model and strategy wereproposed. This dissertation presented the existing authentication models and strategies.Extract the advantages of these models for large-scale network authentication Ad hoc wasarranged. Combined with the practical application of the specific circumstances, a emergencymobile Ad hoc network authentication protocol was proposed. Better to solve the emergencyAd hoc network authentication problem.The major achievements in this dissertation are as follows:(1) Several commonly utlizing authentication model in Ad hoc networks was discussed,and the advantages and disadvantages of the various programs were analyzed, pointing outthat the use of distributed authentication suitable for authentication in emergency Ad hocnetworks.(2) Ad hoc networks in emergency communications, a single node and multiple-nodecommunication is very important, so can coordinate the network resources, and efficient tosolve emergency situations arise. Application broadcast encryption technology can effectivelyensure messages during the broadcast of safety. Taken the threshold encryption mechanism toidentity-based broadcast encryption, emergency Ad hoc network dynamic threshold broadcastencryption scheme was proposed. This program effectively overcome the single node offailure in the network problem. The program based on the determination MBDH securityissues, the proposed scheme reaches IND-sID-CPA security was proved.(3) Combined the password authentication and Ad hoc distributed network authenticationmodel, an emergency mobile Ad hoc network identity authentication scheme based onbroadcast encryption was presented. Password authentication was used to solve thecorrespondence about users and devices. Using the distributed authentication solves theproblem of node authentication when it join the large scale Ad hoc network arranged.(4) The maken security analysis that the proposed schemes on an emergency broadcastencryption-based mobile Ad hoc network authentication schemes. And this discussed schemecan deal with common assault case about the authentication. The smallest calculated cost ofthe program was derived, and be able to defence the common network attacks.
Keywords/Search Tags:Ad hoc network, Identity-based, Broadcast Encryption, Identity Authentication
PDF Full Text Request
Related items