SWARM─無線隨意網路的安全憑證系統
SWARM—Secure Wireless Ad-hoc network Reliance Management
Date Issued
2005
Date
2005
Author(s)
Tsai, Lin-Jiun
DOI
en-US
Abstract
Unlike wired networks that use dedicated nodes to support security functions like authentication and key management. Most of traditional security mechanisms do not work well in ad hoc wireless networks due to the lack of infrastructure. We use a clustering heuristic and adapt it for security requirements to provide a scalable authentication framework in the clustered ad hoc network. This novel approach can be used to achieve a variety of security objectives through the peer-to-peer authentication scheme. It scales well to large network size and does not require high node density and mobility speed like other distributed schemes. After forming clusters with a radius parameter, it allows separate authentication services to be employed for different physical conditions or security requirements into independent clusters, and each node in the network can obtain the topology of the clusters as well as the keys of all authentication services. The topology, which is called the virtual trust backbone of clusters, describes the trust relationship among clusters and is used to evaluate the trustworthiness of clusters, and the keys are used to verify entity certificates from distinct clusters. Finally, we evaluate the security scheme and simulate its performance on various configurations of ad hoc networks.
Subjects
無線網路安全
憑證管理
隨意網路
群組式架構
max-min網路分群法
PGP
公開金鑰基礎建設
wireless network security
certificate authentication
ad hoc networks
cluster-based framework
max-min clustering
PKI
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-94-R92922071-1.pdf
Size
23.31 KB
Format
Adobe PDF
Checksum
(MD5):2f9ee1e07177827318a033ba8304e011
