Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
碩士 === 長庚大學 === 電機工程研究所 === 91 === Ad hoc networks are organized by collection of mobile communication devices without fixed infrastructure, and with no pre-determined organization of available links. There are various challenges that are faced in the Ad-hoc environment. These are mostly...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/77227937888040870701 |
id |
ndltd-TW-091CGU00442012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091CGU004420122016-06-24T04:15:56Z http://ndltd.ncl.edu.tw/handle/77227937888040870701 Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks AdHoc無線網路身份鑑別與金鑰交換之研究 Bo-Tai Chen 陳柏泰 碩士 長庚大學 電機工程研究所 91 Ad hoc networks are organized by collection of mobile communication devices without fixed infrastructure, and with no pre-determined organization of available links. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The inherent quality —wireless and mobility- of wireless mobile networks and the lack of centurial control units, the security is usually a weaker point for ad hoc networks. Public key infrastructure(PKI) offer the authentication and key exchange scheme to achieve such security goals as privacy, non repudiation, and integrity. The traditional public key infrastructure must have a centurial control unit call certificate authority(CA) for issuing certificates, revoking certificates, creating and publishing certificate revocation lists, and key and lifecycle management. Thus it cannot applied to wireless ad hoc networks. In this thesis, a identity-based(ID-based) key exchange and authentication protocol is proposed to remedy the disadvantage. Erl-Huei Lu 盧而輝 2003 學位論文 ; thesis 38 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 長庚大學 === 電機工程研究所 === 91 === Ad hoc networks are organized by collection of mobile communication devices without fixed infrastructure, and with no pre-determined organization of available links. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks.
Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The inherent quality —wireless and mobility- of wireless mobile networks and the lack of centurial control units, the security is usually a weaker point for ad hoc networks. Public key infrastructure(PKI) offer the authentication and key exchange scheme to achieve such security goals as privacy, non repudiation, and integrity.
The traditional public key infrastructure must have a centurial control unit call certificate authority(CA) for issuing certificates, revoking certificates, creating and publishing certificate revocation lists, and key and lifecycle management. Thus it cannot applied to wireless ad hoc networks. In this thesis, a identity-based(ID-based) key exchange and authentication protocol is proposed to remedy the disadvantage.
|
author2 |
Erl-Huei Lu |
author_facet |
Erl-Huei Lu Bo-Tai Chen 陳柏泰 |
author |
Bo-Tai Chen 陳柏泰 |
spellingShingle |
Bo-Tai Chen 陳柏泰 Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks |
author_sort |
Bo-Tai Chen |
title |
Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks |
title_short |
Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks |
title_full |
Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks |
title_fullStr |
Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks |
title_full_unstemmed |
Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks |
title_sort |
building the identification and authentication mechanism in mobile ad hoc networks |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/77227937888040870701 |
work_keys_str_mv |
AT botaichen buildingtheidentificationandauthenticationmechanisminmobileadhocnetworks AT chénbǎitài buildingtheidentificationandauthenticationmechanisminmobileadhocnetworks AT botaichen adhocwúxiànwǎnglùshēnfènjiànbiéyǔjīnyàojiāohuànzhīyánjiū AT chénbǎitài adhocwúxiànwǎnglùshēnfènjiànbiéyǔjīnyàojiāohuànzhīyánjiū |
_version_ |
1718323011800530944 |