Font Size: a A A

Authentication And Key Distribution Of Heterogeneous Ad Hoc Networks

Posted on:2018-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:J L RenFull Text:PDF
GTID:2428330542492997Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the development of wireless communication technology,the traditional wireless communications network has been unable to meet the communication needs in some cases,such as in remote areas without communication base station,the disaster area after the earthquake damaged infrastructure,special communication needs where sea and air etc..At this time,the wireless ad hoc network can give full play to its advantages and provide people with good communication services.Different from the traditional wireless communication network base on base station,the ad hoc network is a no-center multi hop network that forwarding data through various communication nodes to realize wireless communication,which has advantages of convenient deployment,no need for the construction of communication base station.But at the same time,wireless ad hoc network's terminal nodes has limited computing power,which has too much complicated authentication process and key management difficulties when there are amount of mobile nodes,and in the heterogeneous network integration,we need to solve the problem of authentication and key agreement across security domains.Aiming at this problem,this paper proposed a heterogeneous multi domain ad hoc network access authentication and key management scheme,which effectively realise rapid access authentication and safe communication in the heterogeneous multi domain wireless ad hoc network which has amount of mobile nodes,。The scheme is based on CPK for key distribution and management,and it is carried out in the way of symmetric key and asymmetric key,and the cross-security domain access authentication is carried out under the EAP architecture.The scheme is based on thecpk system,and the node can compute the first order combination public key without the third part after obtaining the identity information of other nodes through its own identity information,system public key SPK,and the first order combination of private key CSK.At the end we built the prototype systemand the performance of this scheme is verified by test.
Keywords/Search Tags:Heterogeneous Multi domain, Wireless Ad Hoc Network, Authentication, Key Management
PDF Full Text Request
Related items