Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks

碩士 === 長庚大學 === 電機工程研究所 === 91 === Ad hoc networks are organized by collection of mobile communication devices without fixed infrastructure, and with no pre-determined organization of available links. There are various challenges that are faced in the Ad-hoc environment. These are mostly...

Full description

Bibliographic Details
Main Authors: Bo-Tai Chen, 陳柏泰
Other Authors: Erl-Huei Lu
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/77227937888040870701
id ndltd-TW-091CGU00442012
record_format oai_dc
spelling ndltd-TW-091CGU004420122016-06-24T04:15:56Z http://ndltd.ncl.edu.tw/handle/77227937888040870701 Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks AdHoc無線網路身份鑑別與金鑰交換之研究 Bo-Tai Chen 陳柏泰 碩士 長庚大學 電機工程研究所 91 Ad hoc networks are organized by collection of mobile communication devices without fixed infrastructure, and with no pre-determined organization of available links. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The inherent quality —wireless and mobility- of wireless mobile networks and the lack of centurial control units, the security is usually a weaker point for ad hoc networks. Public key infrastructure(PKI) offer the authentication and key exchange scheme to achieve such security goals as privacy, non repudiation, and integrity. The traditional public key infrastructure must have a centurial control unit call certificate authority(CA) for issuing certificates, revoking certificates, creating and publishing certificate revocation lists, and key and lifecycle management. Thus it cannot applied to wireless ad hoc networks. In this thesis, a identity-based(ID-based) key exchange and authentication protocol is proposed to remedy the disadvantage. Erl-Huei Lu 盧而輝 2003 學位論文 ; thesis 38 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 長庚大學 === 電機工程研究所 === 91 === Ad hoc networks are organized by collection of mobile communication devices without fixed infrastructure, and with no pre-determined organization of available links. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The inherent quality —wireless and mobility- of wireless mobile networks and the lack of centurial control units, the security is usually a weaker point for ad hoc networks. Public key infrastructure(PKI) offer the authentication and key exchange scheme to achieve such security goals as privacy, non repudiation, and integrity. The traditional public key infrastructure must have a centurial control unit call certificate authority(CA) for issuing certificates, revoking certificates, creating and publishing certificate revocation lists, and key and lifecycle management. Thus it cannot applied to wireless ad hoc networks. In this thesis, a identity-based(ID-based) key exchange and authentication protocol is proposed to remedy the disadvantage.
author2 Erl-Huei Lu
author_facet Erl-Huei Lu
Bo-Tai Chen
陳柏泰
author Bo-Tai Chen
陳柏泰
spellingShingle Bo-Tai Chen
陳柏泰
Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
author_sort Bo-Tai Chen
title Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
title_short Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
title_full Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
title_fullStr Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
title_full_unstemmed Building the Identification and Authentication Mechanism in Mobile Ad Hoc Networks
title_sort building the identification and authentication mechanism in mobile ad hoc networks
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/77227937888040870701
work_keys_str_mv AT botaichen buildingtheidentificationandauthenticationmechanisminmobileadhocnetworks
AT chénbǎitài buildingtheidentificationandauthenticationmechanisminmobileadhocnetworks
AT botaichen adhocwúxiànwǎnglùshēnfènjiànbiéyǔjīnyàojiāohuànzhīyánjiū
AT chénbǎitài adhocwúxiànwǎnglùshēnfènjiànbiéyǔjīnyàojiāohuànzhīyánjiū
_version_ 1718323011800530944