Font Size: a A A

Research Of Message Authentication Scheme In Mobile AD Hoc Networks

Posted on:2008-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:D D LuFull Text:PDF
GTID:2178360272468331Subject:Information security
Abstract/Summary:PDF Full Text Request
Moblie Ad Hoc Networks(MANETs) is a special wireless network, which now have demonstrated broad application prospects in the the military, commercial, personal computer field. Before it is implemented, the first thing to address is the safety of Mobile Ad Hoc Networks. Mobile Ad Hoc Networks, because of their own characteristics, such as no center, self-organization, dynamic changes in the network topology, limited energy and computing power, it is easier to suffer passive eavesdropping and active attack, leading many secure protocals in the fixed network and general wireless network that have been achieved to become not available for Mobile Ad Hoc Networks.Currently, Mobile Ad Hoc Networks is getting more and more attention at home and abroad, especially the key agreement and authentication schemes. According to the features of Mobile Ad Hoc Networks, the existing safety problems will be solved by message authentication schemes.Based on a propoesed key agreement protocal called CRTDH(Chinese Remainder Theorem and Diffle-Hellman), AUTH-CRTDH is a modified key agreement protocal with authentication capability, it uses the ID-based authentication scheme to authenticate the node itself to any other node in the network, which can prevent man-in-the-middle and Least Common Multiple(LCM) attacks. ASKAMC(Authenticated session key agreement based on multilayer clustering)is a authenticated session key agreement protocal for clustering Mobile Ad Hoc Networks, it adopts three-tier structure of the cluster, CCH(Control ClusterHead) verify CH(ClusterHead) and CH verify the normal nodes in its cluster..Then MPODSRP(Multi-path On-demand Secure Routing Protocol) is designed, it is a multi-path on-Demand secure routing authentication protocol, which includes two parts: Distributed authentication model(DAM) and routing authentication process. DAM is a distributed trust computing and management model, it can be used to exclude malicious nodes during the routing discovery process. Routing authentication process achieved the identity and message integrity authenticity between the nodes in MANETs.In order to improve the well known data transmission protocol in MANETs which is SMT(secure message transmission protocol), MODSMT is designed. MODSMT brings foword detailed description of the information coding technology, message authentication scheme and the process of feedback mechanism et al. MODSMT is good at preventing adversarial acitons such as dropping packets, injecting new packets, tampering with the packets. It achieves the identity authentication between the nodes and sets a parameter to guard against DoS attack. It also gives a balance between security and efficiency according to the network conditions.In a word, message authentication schemes are used in the three important stages: Key agreemnet, routing discovery and data communication. Under the characteristics of these three stages, different message authentication schemes and their corresponding security authentication protocol is put forward. Each of these authentication protocols has its own characteristics, and in some sense, they solve the security problems for Mobile Ad Hoc Networks.
Keywords/Search Tags:MANETs(Moblie Ad Hoc Networks), Message authentication, Key agreement, Secure routing, Secure data transmission
PDF Full Text Request
Related items