Font Size: a A A

The Research Of Key Management And Authentication For Wireless Ad-Hoc Network

Posted on:2016-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:W N LiuFull Text:PDF
GTID:2298330467476612Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of sensor and wireless network technologies, wireless ad-hoc networks have gradually been applied in many real world applications. The nodes with sensing function in wireless ad-hoc network can communicate with each other in a self-organized manner, and can finish the assigned job without manual operations. Therefore, this kind of wireless networks have attracted the attentions of many research institutions and companies. Wireless sensor networks and vehicular ad-hoc networks are two hot topics in the research field of wireless ad-hoc network. In this paper, these two types of wireless ad-hoc networks are studied. The fact that wireless ad-hoc networks consist of wireless channel and low-cost sensor node makes it vulnerable to attacks. Therefore, protecting the security of wireless ad-hoc networks becomes very important. Key management and authentication which are among the most popular security foundations are our research focuses. For wireless sensor network, this paper proposes a virtual coordinate plane based copy node detection authentication method while for vehicle ad-hoc network, this paper proposes a self-healing supported group key distribution scheme.In the proposed copy node detection authentication method, the group manager is responsible for maintaining a virtual coordinate plane. The point which represents a sensor node in the virtual coordinate plane is related to real geographic location of the represented sensor node. At the initial phase, the group manager will calculate a position in coordinate plane for each sensor node. When a node needs to be authenticated, with the help of other sensor nodes, the group manager can compute whether the authenticated sensor node is located in the place which it should be located in. If yes, then this sensor node passes the authentication of the group manager. Otherwise, the authentication fails. With our protocol, the group managers can effectively detect copy node and can check out some collusion nodes, which want to help the copy node pass the authentication of the group manager, with a very high probability.This paper designs and implements a vehicle ad-hoc network oriented group key distribution scheme by studying a wireless sensor network oriented group key distribution scheme and the features of vehicle ad-hoc network. The proposed scheme is based on road side unit which works as the group manager and will distribute the group key computation material to the intragroup vehicles. With the import of the authentication polynomial, only the valid vehicle can obtain the correct group key. In addition, as the authentication polynomial changes in every session, the value which is obtained by the factorization of the authentication polynomial in one session, cannot be used to compute the group key in another session. Furthermore, the proposed scheme also meets the security requirements which a group key scheme should satisfy, such as forward and backward security, confidentiality and so on.
Keywords/Search Tags:wireless sensor network, vehicle ad-hoc network, copynode attack, group key distribution
PDF Full Text Request
Related items