Dissertation > Excellent graduate degree dissertation topics show

Research on Key Management and Certificate Revocation for Ad Hoc Networks

Author: LiuCong
Tutor: MaHua
School: Xi'an University of Electronic Science and Technology
Course: Applied Mathematics
Keywords: Ad Hoc Key Management Certificate Revocation Distributed Algorithms
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 88
Quote: 1
Read: Download Dissertation


As a wireless network with no fixed infrastructure , Ad Hoc network has a unique advantage in the battlefield , emergency occasions . Since the nineties of the last century , Ad Hoc wireless communications , mobile communications and network security academia research one of the hot . However , due to the characteristics of its open medium , dynamic topology , distributed collaboration , and limited ability , Ad Hoc networks are highly vulnerable to attacks. In order to enable it to have been implemented successfully , you need to carry out in-depth study of its various aspects , which provide security services for Ad Hoc Networks is one of the main research content . This article on the Ad Hoc network key management, certificate revocation specific research , the research results are as follows : (1) Distributed Certificate Revocation for Ad Hoc Networks algorithm , the algorithm uses the revocation status of weights record of the matrix A (TW) relations and node description node revocation credibility to the progressive realization of the changing of the weights of the network operation process ; ; weights iterative relationship with the network malicious node is revoked , the normal node weights worth to the recovery , very suitable for the Ad Hoc network . (2) proposed a model based on the distributed CA certification certificate revocation scheme , the scheme uses one-way hash chain to achieve node accused the message data origin authentication using the allegations matrix Aij (T) and the quotient vector W ( T ) the completed certificate revocation of malicious nodes , and consider the impact of the number of nodes of the allegations of its own allegations efforts effectively prevent malicious nodes conspire revoke the certificate of legal node , and enhance the security of the system .

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. Design and Implement of Multi-Port Network Communication Platform,TN929.5
  3. Power Aware Routing Protocal Based on OLSR in Ad Hoc Network,TN929.5
  4. Research on Transparent Security of JPEG Image,TP391.41
  5. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  6. Key technologies of field communications network based on Ad Hoc Networks,TN929.5
  7. Region-based wireless sensor network key management scheme for research,TP212.9
  8. Design and Simulation on Topology Reconstruction Scheme in Ad Hoc Networks,TN929.5
  9. Group Key Management in Wireless Sensor Networks,TN918.82
  10. Research on Localization Algorithm for Wireless Sensor Network in Three-Dimensional Space,TN929.5
  11. Research and Simulation of Routing Protocols in Ad-Hoc Network Based on NS2,TN929.5
  12. Research on Trusted Aodv (Ad-Hoc on-Demand Distant Vector) in Wireless Ad-Hoc Networks,TN929.5
  13. A Study on the Mobile Ad Hoc Network QoS On-demand Routing Protocol,TN929.5
  14. The Research on Energy Saving and Security Routing Protlcol Based on AODV,TN929.5
  15. Analysis and Improvement Strategy of TCP Performance for Ad Hoc Networks,TN929.5
  16. Research on Cooperative Caching in Mobile Peer-to-Peer System Based on Ad Hoc Network,TN929.5
  17. MAODV multicast routing protocol optimization,TN929.5
  18. Research on Routing Algorithm in Ad Hoc Network Based on Improved Ant Colony Algorithm,TN929.5
  19. Research and Optimization of the Cluster Based Routing Protocol in Ad-Hoc Network,TN929.5
  20. Routing of Wireless Ad Hoc Network Based on Genetic Tabu Search Algorithm,TN929.5
  21. Application of Ad Hoc Network in Oil Drilling Engineering,TN929.5

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile