首页> 外文学位 >Secure, redundant and fully distributed key management for mobile ad hoc networks: An analysis.
【24h】

Secure, redundant and fully distributed key management for mobile ad hoc networks: An analysis.

机译:移动ad hoc网络的安全,冗余和完全分布式密钥管理:一种分析。

获取原文
获取原文并翻译 | 示例

摘要

Ad hoc networks are emerging to be "anywhere anytime networks". The main difference between traditional networks and ad hoc networks is the lack of a central administration, which is responsible for providing security services such as defining the security services, policies for the network and pre-distribution of keys to all the participants. Due to the lack of infrastructure in ad hoc networks, providing security becomes a major challenge. The traditional mechanisms of providing security cannot be applied to ad hoc networks due to their high computational complexity. Hence, the security protocol proposed should have low computational complexity and factors like dynamic topology, limited bandwidth, energy constraints have to be taken into consideration.;In the modified scheme, the level of security provided decreases as compared to the original scheme, due to the decrease in the number of nodes to be compromised. However, increasing the number of shares per node helps in recreating the CA key in spite of high mobility. A probabilistic analysis of security versus the ease of CA key recreation is also presented.;In this research a modification to existing fully-distributed certificate authority scheme is proposed. This modification is based on incorporating redundancy into the network by allocating more than one share per node. This results in the decrease in the number of neighbors required to recreate the Certificate Authority (CA) key. The services provided by the CA such as the certificate renewal, share update will be provided in the modified scheme.
机译:Ad hoc网络正在成为“随时随地的网络”。传统网络与ad hoc网络之间的主要区别是缺少中央管理,该中央管理负责提供安全服务,例如定义安全服务,网络策略以及将密钥预分配给所有参与者。由于ad hoc网络中缺乏基础架构,因此提供安全性成为一项主要挑战。提供安全性的传统机制由于其高计算复杂性而无法应用于ad hoc网络。因此,提出的安全协议应具有较低的计算复杂度,并且必须考虑诸如动态拓扑,带宽受限,能量约束之类的因素。在修改后的方案中,由于原始方案的存在,提供的安全级别与原始方案相比有所降低减少要折衷的节点数量。但是,尽管移动性很高,但增加每个节点的共享数仍有助于重新创建CA密钥。还对安全性与CA密钥重新创建的难易程度进行了概率分析。此修改基于通过将冗余分配到网络中(每个节点分配一个以上的份额)。这导致重新创建证书颁发机构(CA)密钥所需的邻居数量减少。由CA提供的服务(例如证书更新,共享更新)将在修改后的方案中提供。

著录项

  • 作者

    Joshi, Deepti.;

  • 作者单位

    Wichita State University.;

  • 授予单位 Wichita State University.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 M.S.
  • 年度 2004
  • 页码 57 p.
  • 总页数 57
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号