Font Size: a A A

Research On Group-based Mobile Ad Hoc Network Security

Posted on:2007-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y S ChenFull Text:PDF
GTID:2178360242961841Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the growing of civil and military applications of mobile ad hoc network,the security technology of the network receives more attention. Since mobile ad hoc network has no fixed infrastruture, dynamical topology structure,limited battery and tardiness computing, so the traditional wireless communications network and Internet network routing protocols,network authentications,digital signature technology do not adapt the secure requirement of the mobile ad hoc network.Currently, amongst the studies on the mobile ad hoc network, the secure issue gradually become hotspot. After introduced the infrastructure and main secure menace, analyse the domestic and overseas study status about the mobile ad hoc network.In a mobile ad hoc network, each node cannot be trusted absolutely. Base on this characteristic, a new type of based-group network structure has been put forward and all the network structure is based on the group. Expatiate the basic concept of group, the group characteristic , the define of group. Study the group initialization and mobile group management. Discuss the group implementation.Depend on the group structure, and combine the based-threshold authentication certification service, put forward secure solution inside group. Deeply study the authentication service and digital signature,part certification discrimination and compound.Analyse traditional cryptogram key management and authentication process. Study on generate the private key and refresh, part certification signature, update, revoke. Put new arithmetic about part certification discrimination and compound.At last using NS simulator, imitate the based-group certification service frame and validate the based-group efficiency.
Keywords/Search Tags:mobile ad hoc network, group-based, network model, threshold authentication, cryptography key management
PDF Full Text Request
Related items