Dissertation > Excellent graduate degree dissertation topics show

Research on the Security Scheme of Mobile Ad Hoc Networks Based on the Trust-value

Author: WangLi
Tutor: WangTianQin
School: Henan University
Course: Applied Computer Technology
Keywords: Clustering Service group Trust Key share Public Key Infrastructure
CLC: TN929.5
Type: Master's thesis
Year: 2011
Downloads: 28
Quote: 2
Read: Download Dissertation


With the rapid development of network technology, wireless transmission technology based mobile ad hoc networks (Mobile Ad hoc Network MANET) began to emerge. Mobile ad hoc networking with traditional wireless network differs from that: the mobile ad hoc network does not require any fixed infrastructure, capacity and status of all nodes in the network are equal, the work of the network are the nodes in the network completion of the consultation. In addition, all the nodes in the network are in the active state can always enter or leave the network, the topology of the network presents the dynamic changes in the characteristics. Therefore, the traditional wireless network security protocols have been unable to apply well in mobile ad hoc networks which. Identity-based mobile ad hoc network security solutions and fully distributed security solutions for mobile ad hoc networks proposed program is divided into. However, the presence of key fixed nodes can not move easily attack the problem in the identity-based security solutions; while fully distributed solution to the lack of effective control and management, so that the calculation of the node consumes too heavy, too much traffic, thus increasing the difficulty of implementation. In response to these problems, this paper designed an efficient security solutions for mobile ad hoc networks can better adapt to. The paper work is as follows: 1 for all nodes in the network is divided into a number of clusters, which have up a secure connection node elected cluster head node connected to the cluster head security at the core node cluster head node together constitute the cluster service group . Dispersion function of the key generation center to a service group node by service group node to complete. The same time, the service node cluster key and secret share generation cluster nodes Report message authentication, new node authentication and key periodic updates, thus reduced the overall cluster nodes The amount of computation and the traffic. However, the service group of nodes is not fixed, but with the update of the cluster dynamically election, in order to avoid service group node to become a network bottleneck. 2 between nodes trust evaluation mechanism, through inter-node interactive behavior to the node between the trust degree carried quantify, compare the neighbor nodes Confidence and trust degree threshold value, to judge neighbor whether the existence of malicious nodes and promptly report to the cluster service group. The service group by deviation from the test to verify that the report is true, to take appropriate treatment. The introduction of the idea of ??the public key infrastructure authentication node by node authentication parameters to the node identity information and key node and the node's secret share bundled, certification for identity node in the network. Cluster update, you can verify node authentication parameters to determine whether the node has updated eligibility. 4 defines the a cluster key node key broadcast information within the cluster cluster public key encryption only node in the cluster can decrypt. The communication between nodes in the cluster by the node key encrypted in order to ensure the confidentiality of the contents of the communication between nodes. Inter-cluster communication through the cluster head, with the session key between cluster heads. Cluster a node for communication with other clusters of nodes, the first message sent to the first cluster, the message encrypted by first cluster after forwarding, after forwarding purposes cluster in first by decrypting and eventually reaches the destination node. Comparative analysis. Theoretical superiority of the program to be verified by simulation.

Related Dissertations

  1. Research and Implementation of Mining Implicit User Interest,TP311.13
  2. Establishment and Update of Similar Users’ Cluster in Personalized Information Retrieval,TP391.3
  3. Research on Removal Algorithm of Shadows in Image Segmentation,TP391.41
  4. The Research of the Text Extraction Method Based on Spectral Cut,TP391.41
  5. Gao Zhong-ying academic thought and experience and use of Bufei Decoction treatment of common diseases of the respiratory system drug law,R249.2
  6. Research and Improvement on K-Means Clustering Algorithm,TP311.13
  7. Research on the Situation of Alienation and the Relationship among Alienation, Family Cohesion, Family Adaptability and Interpersonal Trust for College Students,B844.2
  8. The Research of Dynamic Trust Model on Cloud Computing Platform,TP309
  9. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  10. Research of Scheduling Algorithm Based on Hybrid Adaptive Genetic Algorithm in Computing Grid,TP393.09
  11. Evaluation of Photosynthetic Efficiancy of Seedlings of the Hybrid Progenies (F1) in Peach,S662.1
  12. The Load Research and Comprehensive Evaluation on the Agricultural Non-Point Source Pollution in Nantong,X592
  13. Research of Sensitive Information Protection Techniques for Automated Trust Negotiation,TP309
  14. BF-FCM Clustering Algorithm and Its Application in the Image Segmentation,TP391.41
  15. The Application of Ant Colony Algorithm in Meteorological Satellite Cloud Pictures Segmentation,TP391.41
  16. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  17. Research on K-means Optimization Clustering Algorithm,TP311.13
  18. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  19. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  20. The Establishment of Grid Platform on Agricultural Supply Chain System,S126
  21. Study on Photosynthetic Characteristics of Peach Based on Heterosis of Assimilation Capacity,S662.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications
© 2012 www.DissertationTopic.Net  Mobile