Font Size: a A A

An Identity-based Cluster Access Control Model With Dynamic Trust Agent For Mobile Ad Hoc Networks

Posted on:2008-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhouFull Text:PDF
GTID:2178360215973841Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless Ad Hoc network, as a latest network that has attracted much attentionin wireless communication field in recent years, has a very wide applicationpromising in military field, space exploration, and enriching people's communicationbecause it is infrastructure-less, easily constructible, user mobility supporting.However, since Ad Hoc network has the features mentioned above, the network useror terminal is easier to be threatened by various network attacking. With the rapiddevelopment and application of Ad Hoc network technologies, the security of Ad Hocnetwork has become a highlighted research subject.At present, in order to address the problems and difficulties in the security of AdHoc network, many scholars in the world have proposed series of new networkauthentication policies and models, the deepened research and analysis have beenmade about this policies and models in this paper. In order to overcome the defectsand shortcomings in these methods, a cluster access control model based on identityauthentication and dynamic trust agent is proposed in this paper. The major works andachievements in this paper are as follows:(1) The concept of dynamic trust agent based on authentication trust model andnon-cluster head clustering method is proposed, and the concept is introduced intodistributed CA authentication mechanism which combines the threshold secret sharingmethod and PGP algorithm. The proposed approach can effectively overcome thebottleneck in authentications of multiple nodes and security breaches of single CA scheme.(2) Security architecture of dynamic trust agent based on different authentica-tion levels and combined intrusion detection system (IDS) is built up; and theapplication of proposed cluster control model is extended to inter-cluster andinter-network authentications, the data structure of node ID and inter-cluster andinter-network authentication protocols is also given; at the same time, the rapidinter-cluster and inter-network authentication method is initially proposed using trustrelationship graph of dynamic trust agent under the assumption that the matured trustarchitecture of network is established.(3) The simulation results indicate that the approach proposed in this paper caneffectively enhance the efficiency in the authentications and the security of mobile AdHoc network.
Keywords/Search Tags:Ad Hoc Network, Cluster Access Control, Identity-based Authentication, Dynamic Trust Agent
PDF Full Text Request
Related items