应急移动Ad hoc网络的身份认证协议研究
发布时间:2018-04-02 05:36
本文选题:Ad 切入点:hoc 出处:《华东交通大学》2014年硕士论文
【摘要】:当我们面对大地震、洪涝等自然灾害;较大的交通事故;甚至遭受恐怖袭击等特殊情况发生时,各种组织都会在第一时间派出人员去处理该事件,在这种情况下应急通信的建立是最重要的事情之一。常用的应急通信方式如基于卫星的应急通信等通信方式存在使用价格高、组网不方便、容易被干扰等问题,体现出这些通信方式的局限性。近年来,移动Ad hoc网络成为无线通信中的一个研究热点,因为Ad hoc网络的构建不需要依靠基础设施;组建网络的节点可以移动;以及网络易于构建等特点。同时,Ad hoc网络非常容易遭受很多的网络攻击,对加入Ad hoc网络的节点进行身份认证能够有效的防止非授权用户访问网络,提高网络的安全性。 国内外很多的研究机构都对Ad hoc网络的安全问题进行了深入研究,很多学者提出了一系列的Ad hoc网络认证模型与策略。本文对现有的认证模型与策略进行了研究,,提取了这些模型中适合大规模布置Ad hoc网络身份认证的优点,结合在实际应用中的具体情况,提出了移动Ad hoc网络在应急通信中的身份认证协议。较好的解决了应急Ad hoc网络身份认证问题。 本文主要研究工作和成果如下: (1)讨论了Ad hoc网络中常用的几种身份认证模型,分析了各种方案的优缺点,得出采用分布式认证模型适合移动Ad hoc网络在应急通信中进行身份认证。 (2)移动Ad hoc网络在应急通信中,点对多点的通信非常重要,这样可以协调整个网络中资源,高效的解决出现的突发情况,应用广播加密技术能够有效的保证消息在广播过程中的安全性。将门限加密机制引入到基于身份的广播加密中,给出了应急移动Ad hoc网络动态门限广播加密方案,有效克服了在网络中单点失效问题,该方案通过证明达到IND-sID-CPA安全性。 (3)将口令认证与Ad hoc网络中的分布式认证模型相结合,提出了基于广播加密的应急移动Ad hoc网络身份认证方案。通过口令认证解决了使用者与设备的一一对应,使用分布式认证解决了大规模布置Ad hoc网络时对节点的身份认证问题。 (4)对给出的基于广播加密的应急移动Ad hoc网络身份认证方案进行了安全性分析,得出方案的计算开销较小、能够应对常见的网络攻击。
[Abstract]:When we are faced with major earthquakes, floods and other natural disasters, major traffic accidents, or even special circumstances such as terrorist attacks, various organizations will send personnel to deal with the incident in the first place. In this case, the establishment of emergency communication is one of the most important things. Common emergency communication methods, such as satellite-based emergency communication, have problems such as high use price, inconvenient networking, easy interference and so on. In recent years, mobile Ad hoc networks have become a research hotspot in wireless communication, because the construction of Ad hoc networks does not depend on infrastructure, and the nodes can be moved. At the same time, Ad hoc network is vulnerable to a lot of network attacks. Authentication of nodes joining Ad hoc network can effectively prevent unauthorized users from accessing the network and improve the security of the network. Many research institutions at home and abroad have carried out in-depth research on the security of Ad hoc networks, and many scholars have proposed a series of authentication models and policies for Ad hoc networks. In this paper, the existing authentication models and policies are studied. The advantages of these models which are suitable for large-scale Ad hoc network authentication are extracted. The identity authentication protocol of mobile Ad hoc network in emergency communication is proposed, which solves the problem of identity authentication in emergency Ad hoc network. The main work and results of this paper are as follows:. This paper discusses several authentication models commonly used in Ad hoc networks, analyzes the advantages and disadvantages of various schemes, and concludes that the distributed authentication model is suitable for mobile Ad hoc networks to authenticate identity in emergency communication. Mobile Ad hoc network in emergency communication, point to point communication is very important, so as to coordinate the resources of the entire network, and efficiently solve the burst situation. The application of broadcast encryption technology can effectively guarantee the security of message in broadcast process. The threshold encryption mechanism is introduced into identity-based broadcast encryption, and the dynamic threshold broadcast encryption scheme for emergency mobile Ad hoc network is presented. The problem of single point failure in the network is overcome effectively. The scheme achieves IND-sID-CPA security by proving. 3) combining password authentication with distributed authentication model in Ad hoc network, an identity authentication scheme for emergency mobile Ad hoc network based on broadcast encryption is proposed, which solves the one-to-one correspondence between user and device through password authentication. Distributed authentication is used to solve the problem of authentication of nodes in large scale Ad hoc networks. In this paper, the security of the proposed authentication scheme based on broadcast encryption for emergency mobile Ad hoc networks is analyzed. It is concluded that the computational cost of the scheme is relatively small, and the scheme can deal with common network attacks.
【学位授予单位】:华东交通大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
【参考文献】
相关期刊论文 前3条
1 王海涛,郑少仁,宋丽华;移动Adhoc网络的体系结构和分簇算法[J];解放军理工大学学报(自然科学版);2003年04期
2 王钢;单琦;贾世楼;赵洪林;;Ad hoc网络按需加权分簇算法及其性能分析[J];南京理工大学学报(自然科学版);2006年05期
3 程伟明;无线移动自组网及其关键技术[J];数据通信;2002年03期
本文编号:1699036
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1699036.html