Font Size: a A A

The Design And Realization Of An Distributed Ad Hoc Authentication Scheme Based On CPK

Posted on:2013-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y TuFull Text:PDF
GTID:2248330392457886Subject:Information security
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc network is a communication network without infrastructure. It canformation network flexible and save resources.It is widely used in some environment suchas military and earthquake.But Ad Hoc network is very vulnerable to be attacked, so inthis paper,we use combined public key and secret sharing techn-iques,and design a distributed authentication scheme.The scheme is a good balancebetween the security and efficiency,and is very suitable to use in Ad Hoc network.Firstly,this article analysed the introduce the Elliptic Curve Cryptography and CPKcryptosystem.Then,introduce the secret sharing theory,prove related conclusions of CPKkey synthesis.These form the core theoretical basis of the distributed authentication.It usedthe RSA signature synthetic theory and proposed a complete scheme of certificatesynthesis.In addition, using clustered hierarchical topology against Ad Hoc network’s securityrequirements,so that the scalability of Ad Hoc network is greatly enhanced,the advantages of Ad Hoc network can be fully show.On the basis of the above work,design a cluster distributed authentication schemebased on CPK and secret sharing.This scheme focus on detailed design four processeswhich are CA node obtaining authentication service information,roaming of node,nodeobtaining certificate,two-way authentication of node communication.Based on the scheme above,the article design a complete authentication system.It usethe object-oriented analysis methods,described the system architecture firstly,and thendrew UML sequence diagram for the four scenes in the scheme. Based on the previousanalysis of program flow,it drew the system UML class diagram.Finally,it design the related algorithm for the authentication scheme.And it implementand simulate the related algorithm in linux platform with GMP and ECC-LIB library.
Keywords/Search Tags:Ad Hoc network, Elliptic Curve, Combined Public Key, Secret Sharing
PDF Full Text Request
Related items