Font Size: a A A

Research On Security And Key Management In Mobile Ad Hoc Network

Posted on:2008-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:T LiFull Text:PDF
GTID:2178360212493977Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc networks is a kind of wireless and mobile network .It has a dynamic and variable topology, each node not only can move but can join or exit the network freely. It has an acentric and infrastructureless distributed multi-hop structure, all nodes have an equal status and act as two roles-router and node itself.Mobile Ad Hoc networks is very easy to be attacked because of its own characteristic and faced with many security challenges .Therefore, its security is becoming an important research subject in the field of Mobile Ad Hoc networks. As an important part of net security, Key management attracts more and more attention.The article first introduces the application, network structure, characteristic and the essential technology of Mobile Ad Hoc Networks, as well as the thorough research on its security problems, including the security threats, security target, security requirement that network is faced with. Then it introduces the elementary theory of Key Management, and research each Key Management technology of Mobile Ad Hoc networks. It also summarizes and comparatively analyzes nowadays Key Management plans. In this foundation, the article proposes a new scheme that is threshold key management of ID-based encryption. Compared with the traditional PKI system, this scheme has abbreviated to the authentication process of the initial public key certificate, which save the bandwidth and computation quality. Moreover, because it does not need authentication of certificate of public key. Therefore, it can well satisfy the need of Mobile Ad Hoc Networks. Cluster structures can enable the expansion of the plan and enhance the usability of the security service. The scheme sets up ID-based cryptography with a trusted third party, which can greatly improve network security. In each cluster, CH is responsible to the security. When the CH is in danger, its responsibility will be given to a node on another cluster to make sure of the security of the CH by the CH election mechanism, which can in certain degree decrease the threats to CH. The mechanism about new CH receiving main private key components guarantees CH's security and usability. Finally, the security and performance analysis to the scheme is carried on.
Keywords/Search Tags:Mobile Ad Hoc Networks, ID-based Encryption, Key Management, threshold
PDF Full Text Request
Related items