Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets

碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 97 === Mobile ad-hoc networks have wireless links and infrastructure-less nature. The wireless nodes operate both as communication end-points as well as routers, enabling multi-hop wireless communication. The wireless communication links can be eavesdropped on withou...

Full description

Bibliographic Details
Main Authors: Tzu-Wei Chien, 簡子偉
Other Authors: Chyi-Ren Dow
Format: Others
Language:en_US
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/90296877809684016998
id ndltd-TW-097FCU05392006
record_format oai_dc
spelling ndltd-TW-097FCU053920062015-11-23T04:03:34Z http://ndltd.ncl.edu.tw/handle/90296877809684016998 Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets 在隨意行動網路上利用任播機制設計及實作一個門檻金鑰管理系統 Tzu-Wei Chien 簡子偉 碩士 逢甲大學 資訊電機工程碩士在職專班 97 Mobile ad-hoc networks have wireless links and infrastructure-less nature. The wireless nodes operate both as communication end-points as well as routers, enabling multi-hop wireless communication. The wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wired networks, known attacks like masquerading, man-in-the middle, and replaying of messages can easily be carried out. Obviously, building the trusted relationship of the nodes is an important element for MANets. Some security schemes of key management have been proposed in MANets which use threshold cryptography schemes to protect a key file or certificate. Threshold cryptography is a method to divide a file into n secret slices. In such a way that the file can be easily reconstructed with any k secret slices. Those security schemes require simultaneous communication with group-subset nodes. Those security schemes need a location repository to collect address of service node and maintain an address list. Those schemes encounter some problems, including data freshness, cost of update and slow converge. The anycast-k technology allows a node to discover any k nodes of same anycast group without location repository. As far as we know, there is no implementation of IPv6-based threshold key management system using anycast-k scheme in MANets. Therefore, we design and implement a threshold key management system using anycast schemes in MANets. The experiment results show that anycast-k can effectively discover k services, reduce control overhead, and improve the rate of fault tolerant. Chyi-Ren Dow 竇其仁 2008 學位論文 ; thesis 50 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 97 === Mobile ad-hoc networks have wireless links and infrastructure-less nature. The wireless nodes operate both as communication end-points as well as routers, enabling multi-hop wireless communication. The wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wired networks, known attacks like masquerading, man-in-the middle, and replaying of messages can easily be carried out. Obviously, building the trusted relationship of the nodes is an important element for MANets. Some security schemes of key management have been proposed in MANets which use threshold cryptography schemes to protect a key file or certificate. Threshold cryptography is a method to divide a file into n secret slices. In such a way that the file can be easily reconstructed with any k secret slices. Those security schemes require simultaneous communication with group-subset nodes. Those security schemes need a location repository to collect address of service node and maintain an address list. Those schemes encounter some problems, including data freshness, cost of update and slow converge. The anycast-k technology allows a node to discover any k nodes of same anycast group without location repository. As far as we know, there is no implementation of IPv6-based threshold key management system using anycast-k scheme in MANets. Therefore, we design and implement a threshold key management system using anycast schemes in MANets. The experiment results show that anycast-k can effectively discover k services, reduce control overhead, and improve the rate of fault tolerant.
author2 Chyi-Ren Dow
author_facet Chyi-Ren Dow
Tzu-Wei Chien
簡子偉
author Tzu-Wei Chien
簡子偉
spellingShingle Tzu-Wei Chien
簡子偉
Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
author_sort Tzu-Wei Chien
title Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
title_short Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
title_full Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
title_fullStr Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
title_full_unstemmed Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
title_sort design and implementation of a threshold key management system using anycast schemes in manets
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/90296877809684016998
work_keys_str_mv AT tzuweichien designandimplementationofathresholdkeymanagementsystemusinganycastschemesinmanets
AT jiǎnziwěi designandimplementationofathresholdkeymanagementsystemusinganycastschemesinmanets
AT tzuweichien zàisuíyìxíngdòngwǎnglùshànglìyòngrènbōjīzhìshèjìjíshízuòyīgèménkǎnjīnyàoguǎnlǐxìtǒng
AT jiǎnziwěi zàisuíyìxíngdòngwǎnglùshànglìyòngrènbōjīzhìshèjìjíshízuòyīgèménkǎnjīnyàoguǎnlǐxìtǒng
_version_ 1718134596576477184