Font Size: a A A

Key Management Scheme In Ad Hoc Network Based On ECC

Posted on:2013-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:A F YeFull Text:PDF
GTID:2248330392957888Subject:Information security
Abstract/Summary:PDF Full Text Request
Ad hoc network, the wireless mobile ad hoc networks, is topology flexiblemulti-hop wireless network with random mobile network nodes. Its distinguishingfeature is the network speed, and has a strong adaptive at the same time, on thebattlefield in future military and emergency needs such as emergency situations has atemporary network a bright future. At the same time, the Ad hoc network usingwireless links for communication, network topology highly dynamic, and subject tonode and network management resources, and other constraints, vulnerable to a widevariety of network attacks, combined with the traditional wired network securitymechanisms can not be copied to the in Ad hoc networks, Ad hoc network securityissues become a research focus, in order for Ad hoc network of distributed keymanagement, specific studies, including the following:First, in-depth study for Ad hoc network digital signature scheme, combinedwith the elliptic curve size and performance in key areas such as superiority, design ofthe Ad hoc network for elliptic curve digital signature scheme, the program combinessafety multi-party computation and threshold digital signature technology. ECC hasused the advantages of Ad hoc network, for example, safe, small amount of calculation,taking up less space and so on.Second, in-depth study of the mechanism based on threshold secret sharingscheme, combined with Shamir’s (t, n) threshold sharing mechanism is based onproposed ECC-based threshold sharing scheme to improve the Ad hoc networkintrusion tolerance system key.Then, in-depth study based on Ad hoc distributed key management andauthentication program, at home and abroad for Ad hoc network key managementscheme, analysis of different trust model based on a variety of key management scheme, designed unicast environment fully distributed key management scheme. Onthis basis, constructed out of Ad hoc network security channel model, which is basedon the key agreement and authentication protocols, secure channel model is in the DHprotocol on the variation of the ECC-based key agreement scheme the basis of theauthentication process.Finally, in Visual C++6.0programming environment with C++language toimplement the system initialization parameters, a secure channel, key distribution andother functions, and in the NS (Network Simulator) simulator in the simulation.
Keywords/Search Tags:Ad hoc networks, key management, threshold elliptic curve digitalsignature, threshold key sharing
PDF Full Text Request
Related items