Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets
碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 97 === Mobile ad-hoc networks have wireless links and infrastructure-less nature. The wireless nodes operate both as communication end-points as well as routers, enabling multi-hop wireless communication. The wireless communication links can be eavesdropped on withou...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/90296877809684016998 |
id |
ndltd-TW-097FCU05392006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097FCU053920062015-11-23T04:03:34Z http://ndltd.ncl.edu.tw/handle/90296877809684016998 Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets 在隨意行動網路上利用任播機制設計及實作一個門檻金鑰管理系統 Tzu-Wei Chien 簡子偉 碩士 逢甲大學 資訊電機工程碩士在職專班 97 Mobile ad-hoc networks have wireless links and infrastructure-less nature. The wireless nodes operate both as communication end-points as well as routers, enabling multi-hop wireless communication. The wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wired networks, known attacks like masquerading, man-in-the middle, and replaying of messages can easily be carried out. Obviously, building the trusted relationship of the nodes is an important element for MANets. Some security schemes of key management have been proposed in MANets which use threshold cryptography schemes to protect a key file or certificate. Threshold cryptography is a method to divide a file into n secret slices. In such a way that the file can be easily reconstructed with any k secret slices. Those security schemes require simultaneous communication with group-subset nodes. Those security schemes need a location repository to collect address of service node and maintain an address list. Those schemes encounter some problems, including data freshness, cost of update and slow converge. The anycast-k technology allows a node to discover any k nodes of same anycast group without location repository. As far as we know, there is no implementation of IPv6-based threshold key management system using anycast-k scheme in MANets. Therefore, we design and implement a threshold key management system using anycast schemes in MANets. The experiment results show that anycast-k can effectively discover k services, reduce control overhead, and improve the rate of fault tolerant. Chyi-Ren Dow 竇其仁 2008 學位論文 ; thesis 50 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 97 === Mobile ad-hoc networks have wireless links and infrastructure-less nature. The wireless nodes operate both as communication end-points as well as routers, enabling multi-hop wireless communication. The wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wired networks, known attacks like masquerading, man-in-the middle, and replaying of messages can easily be carried out. Obviously, building the trusted relationship of the nodes is an important element for MANets. Some security schemes of key management have been proposed in MANets which use threshold cryptography schemes to protect a key file or certificate. Threshold cryptography is a method to divide a file into n secret slices. In such a way that the file can be easily reconstructed with any k secret slices. Those security schemes require simultaneous communication with group-subset nodes. Those security schemes need a location repository to collect address of service node and maintain an address list. Those schemes encounter some problems, including data freshness, cost of update and slow converge. The anycast-k technology allows a node to discover any k nodes of same anycast group without location repository. As far as we know, there is no implementation of IPv6-based threshold key management system using anycast-k scheme in MANets. Therefore, we design and implement a threshold key management system using anycast schemes in MANets. The experiment results show that anycast-k can effectively discover k services, reduce control overhead, and improve the rate of fault tolerant.
|
author2 |
Chyi-Ren Dow |
author_facet |
Chyi-Ren Dow Tzu-Wei Chien 簡子偉 |
author |
Tzu-Wei Chien 簡子偉 |
spellingShingle |
Tzu-Wei Chien 簡子偉 Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets |
author_sort |
Tzu-Wei Chien |
title |
Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets |
title_short |
Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets |
title_full |
Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets |
title_fullStr |
Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets |
title_full_unstemmed |
Design and Implementation of a Threshold Key Management System Using Anycast Schemes in MANets |
title_sort |
design and implementation of a threshold key management system using anycast schemes in manets |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/90296877809684016998 |
work_keys_str_mv |
AT tzuweichien designandimplementationofathresholdkeymanagementsystemusinganycastschemesinmanets AT jiǎnziwěi designandimplementationofathresholdkeymanagementsystemusinganycastschemesinmanets AT tzuweichien zàisuíyìxíngdòngwǎnglùshànglìyòngrènbōjīzhìshèjìjíshízuòyīgèménkǎnjīnyàoguǎnlǐxìtǒng AT jiǎnziwěi zàisuíyìxíngdòngwǎnglùshànglìyòngrènbōjīzhìshèjìjíshízuòyīgèménkǎnjīnyàoguǎnlǐxìtǒng |
_version_ |
1718134596576477184 |