Dissertation > Excellent graduate degree dissertation topics show

Security Management Mechanism Based on Trusted Computing in Ad-Hoc Network

Author: LuHaiFeng
Tutor: HuangBenXiong
School: Huazhong University of Science and Technology
Course: Signal and Information Processing
Keywords: Self-organizing network Authenticate Key agreement Trusted Computing Elliptic Curve Cryptography
CLC: TN929.5
Type: Master's thesis
Year: 2007
Downloads: 146
Quote: 0
Read: Download Dissertation


With the rapid development of wireless networks , Ad-Hoc network has been widely used in many fields . Ad-Hoc network security issues , however , has not been satisfactorily resolved . How to solve the problem of the security of the Ad-Hoc network is the key to the Ad-Hoc network applications . Thesis depth study for the Ad-Hoc network security issues , given the design and realization of a concrete solution . First, the security issues of the Ad-Hoc network carried out in-depth research . Ad-Hoc network has openness , dynamic topology , and limited network resources and other new features of the Ad-Hoc network security management is unique : no central node and the node computing power , you can not use the traditional firewall technology and certification program based on static configuration . These special characteristics , the paper gives a solution , namely the establishment of a safety management based on trusted computing model (TCSM model ) to solve the security problems of the Ad-Hoc network . The TCSM model of the proposed design thinking and working mechanism , the system description . The TCSM model in the domain of the idea , the Ad-Hoc network into multiple security domains , each security domain to elect a Licensing Center (DA) is responsible for the security domain authentication and key management . The TCSM model the core of trusted computing , and developed based on the Trusted Computing DA 's election strategy . The TCSM model of Elliptic Curve Cryptography (ECC), and the establishment of key management mechanism based on ECC encryption algorithm . The TCSM model working mechanism is the focus of the study . In the realization of the design , TCSM model design registration key communication key two sets of keys as well as high and low level of security . Working mechanism analyzes the initialization , node join , key registration key negotiation communication and workflow node leaves . TCSM model , each node maintains information about the maintenance of the list of the list of information has an important impact on the entire model . Respectively from the two aspects of the feasibility and safety of a systematic analysis of the the TCSM model 's performance .

Related Dissertations

  1. The special trusted computing research and design of the network,TP393.08
  2. UEFI-based trust chain design and implement TPM driver,TP311.1
  3. File Protection System Research Based on Hardware Assisted Virtualization,TP309
  4. Trusted Platform on Research and Implementation of copyright protection model,TP309
  5. Design and Implementation of a Bytecode-based Software Monitoring and Trusted Evolution Framework,TP311.52
  6. Udisk trust chain dynamic tracking technology research and implementation,TP309
  7. Research and Implementation of PrivacyCA System in Trusted Computing,TP393.08
  8. Design of Secure E-mail System Based on Encryption,TP393.098
  9. The Reserch on Efficient Divisible E-Cash Based on ECC,TP393.09
  10. Based on Trusted Computing intranet information security research,TP393.08
  11. Design and Analysis of Some Security Protocols Based on CPK in Trusted Computing Environment,TP309
  12. TCG Software Stack (TSS) Specification Analysis and Implementation,TP309
  13. Research on Trust Model in Ad Hoc Network,TN929.5
  14. 3G-WLAN network integration and implementation of access authentication method,TN929.5
  15. Research on Technology of Application Specific Instruction and Reconfigurable Unit of Elliptic Curve Cryptography Coprocessor Design,TN918.2
  16. Authentication and Key Management Based on CPK,TN918.1
  17. Research and Application of Trust Computing in Direct Power Purchase for Large Consumers,F426.61
  18. The Research and Implementation of Trusted Security Enchancement System Based on USBKey,TP393.08
  19. Design and Implementation of Testing System for Trusted Computing Platform,TP311.53
  20. Design and Implementation of Testing System for Trusted Platform Module,TP309
  21. Research on Function Model of Trusted Computing Mechanism in Vista,TP309

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications
© 2012 www.DissertationTopic.Net  Mobile