Font Size: a A A

Design And Research On Security Mechanism Of Opportunistic Network

Posted on:2017-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:X B ChenFull Text:PDF
GTID:2308330488957823Subject:Information Science and Engineering
Abstract/Summary:PDF Full Text Request
Opportunistic network is a kind of wireless self-organized network which use the chance brings by the move of portable devices to carry out communications, the network nodes using the operation mode of the "carriage-storage-retransmission" and collaborate to complete information transmission and sharing. In the hostile environment that traditional network cannot coverage, the opportunistic network has a broad application prospect. Due to the high mobility、high discontinuity and high instability of network topology, makes it hard for traditional security mechanism be applied to the opportunistic network. In order to solve the security threats that opportunistic network facing, this paper designed a security mechanism scheme under the opportunistic network environment. With the improved certificateless signcryption scheme that based on the discrete logarithm to guarantee secure communication and identity authentication, to meet the requirement of large-scale network, and use ONE simulation tools to carry on the simulation to the performance of the proposed scheme.In this paper, the main research work is as follows:1. This paper presents in detail the basic concepts, characteristics, network characteristic, applications, security requirements, etc.,and briefly expounds related knowledge of cryptography technology and cryptography system in this thesis, analysis and comparison of several typical key management schemes.2. The traditional certificateless signcryption scheme based on the discrete logarithm can only guarantee the security requirements of plane network structure. In this paper, we improve the existing solution and design a certificateless signcryption system that suitable for hierarchical network structure, and proved that can meet the safety and availability.3. Design a security service plan under opportunistic network on the basis of the improved certificateless signcryption scheme. The scheme includes the system initialization, node access, encrypted communication, key agreement, etc., and can realize functions such as secure communication、key management and node access authentication.4. Use ONE simulator simulates key distribution efficiency of our security scheme. The simulation results indicate that this scheme is suitable for large scale network and the efficiency of this scheme has the greater enhancement than the distributed key management scheme; In terms of computational overhead, computing degree is lower than the existing key agreement solutions.
Keywords/Search Tags:opportunistic network, key management, certificateless, signcryption scheme
PDF Full Text Request
Related items