当前位置:主页 > 科技论文 > 网络通信论文 >

基于Ad Hoc网络的跨层协同安全保护机制研究

发布时间:2018-07-04 14:36

  本文选题:Ad + Hoc网络 ; 参考:《西安电子科技大学》2015年硕士论文


【摘要】:随着移动通信的高速发展,世界各国已经对第五代移动通信技术(5G)开展了多方面研究,但与之相关的安全技术研究却相对滞后,5G网络安全体系对安全提出了更高要求,必须提供更高和更多层次的安全机制和更多样化的网络安全解决方案。本文以Ad Hoc网络为原型,重点研究5G移动通信系统组合安全理论中的跨层协同安全技术。通过深入分析Ad Hoc网络的特点与安全问题,阐述了Ad Hoc网络采用跨层设计的必要性,随后在现有Ad Hoc网络跨层设计方案的基础上,从物理层、链路层、网络层、应用层深入研究目前存在的安全威胁与漏洞,找到亟需解决的关键问题,进而采用以跨层设计为基础,突出协同安全的理念,设计了一种自下而上的跨层协同安全保护机制。在方案具体设计中,首先从物理层安全出发,计算通信节点保密容量,努力构建完美保密通道,采用自适应的物理层密钥交换方案,完成物理层密钥的安全生成与交换;其次针对物理层密钥生成效率低,误码率高的特点,应用自同步序列密码技术对物理层密钥进行拓展衍生,设计高效系统跨层密钥发生器,实现密钥跨层使用;最后,与网络层和应用层的系统通信协议相结合,利用以物理层密钥为种子的系统密钥序列加强各种系统通信协议的安全性,避免了多数主流的网络协议攻击方法。最终本文通过跨层协同安全设计,解决了系统密钥管理,通信安全等方面的关键技术问题,实现了自下而上的系统协同安全保护,构建了Ad Hoc网络跨层协同安全防御体系。
[Abstract]:With the rapid development of mobile communication, many countries have studied the fifth generation of mobile communication technology (5G), but the related security technology research is lagging behind. 5G network security system has put forward higher requirements for security. It is necessary to provide higher and more levels of security mechanism and a more diversified network security solution. Based on the Ad Hoc network, this paper focuses on the cross layer cooperative security technology in the combination security theory of 5G mobile communication system. Through the in-depth analysis of the characteristics and security problems of the Ad Hoc network, the necessity of the cross layer design of the Ad Hoc network is expounded. Then, on the basis of the existing cross layer design scheme of the existing Ad Hoc network, the physical layer is from the physical layer. The link layer, the network layer and the application layer deeply study the existing security threats and vulnerabilities and find the key problems that need to be solved. Then, based on the concept of cross layer design and highlight the concept of cooperative security, a top-down cross layer cooperative security protection mechanism is designed. In the specific design of the scheme, the physical layer security is the first step. The security capacity of communication nodes is calculated, the perfect secret channel is constructed, and the adaptive physical layer key exchange scheme is used to complete the security generation and exchange of the physical layer key. Secondly, the characteristics of the physical layer key generation efficiency are low and the bit error rate is high, and the self synchronization sequence cipher technology is used to expand the physical layer key, and the design is efficient. The system cross layer key generator is used to realize key cross layer use. Finally, it combines the system communication protocol of network layer and application layer to strengthen the security of various system communication protocols by using the system key sequence of physical layer key as the seed, avoiding most of the mainstream network protocol attack methods. Finally, this paper through cross layer cooperative security. The design has solved the key technical problems of system key management, communication security and so on. It realizes the system cooperative security protection from bottom to top, and constructs a cross layer cooperative security defense system of Ad Hoc network.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:TN929.5

【参考文献】

相关期刊论文 前1条

1 杨笑;范修斌;武传坤;余玉银;冯秀涛;;BOMM算法的密码学性质[J];软件学报;2012年07期



本文编号:2096385

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/2096385.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户efd80***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com