Font Size: a A A

Key Management Mechanisms Research Andimplementation For Trunking System

Posted on:2015-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:D LiuFull Text:PDF
GTID:2298330467963799Subject:Information security
Abstract/Summary:PDF Full Text Request
Trunking communication system is a special dispatch communication system, which is now widely used in public security, military and other for directing, scheduling functions with higher requirements for the stench. Like public mobile communication systems, trunking communication system also uses a cluster encryption and other security techniques to ensure the safety of the system. Unlike public mobile communication systems, Trunking communication system often uses a flexible multi-level grouping, and supports complex group communication capabilities, and because of its unique application scenarios, trunking communication system also have a higher security requirements. Due to above reason, trunking communication system can not apply the key management without change it into a unique key management mechanism.At present, there are lots of group key management protocols existed. This paper looked through many of them. And after analyzed some typical protocols, this paper proposed a key management protocols based on B tree and LKH combining the characteristics of trunking system.This paper has following achievements:1. Introduced the principles and application of the trunking communication system. Studied the mechanism of group key management and analyzed several group key management protocols, including LKH protocol, OFT protocol, CKC protocols.2. This paper proposed a group key management system based on hierarchical key and implemented a prototype system. The main functions of this prototype include key generation, key distribution and so on.3. This paper promotes a new group key management protocol based on LKH and B tree. This protocol reduced the cost of key management in large group scenarios.
Keywords/Search Tags:trunking communication, key management, LKH, group security
PDF Full Text Request
Related items