Authentication in Ad Hoc Networks for Information Warfare

碩士 === 國防管理學院 === 國防資訊研究所 === 94 === Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each...

Full description

Bibliographic Details
Main Authors: WANG JHIH PENG, 王智鵬
Other Authors: 伍台國
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/67960310304829071960
id ndltd-TW-094NDMC1654015
record_format oai_dc
spelling ndltd-TW-094NDMC16540152015-10-13T10:34:47Z http://ndltd.ncl.edu.tw/handle/67960310304829071960 Authentication in Ad Hoc Networks for Information Warfare 資訊戰身分識別在無線隨意網路中之研究 WANG JHIH PENG 王智鵬 碩士 國防管理學院 國防資訊研究所 94 Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each world advanced country have got to understand that Information Warfare (IW) is the victorious foundation of wining war and proved technological leading one deciding the war since Gulf War. So all of them developed relevant technology actively. The protagonist of the IW is a fight of the network. Communication network is the important media that we have already transmitted the information at present. It is very momentous how to set up a perfect network security environment. It is the primary affair that how to confirm the identity both sides before exchanging the information through the network in IW. The confidential information transmitted needs protection according to the mutual transmission demand as the identities of both sides are verified correctly. It has already become the basic demand and followed that the identity verifies gradually for distributing a session key for both sides owning in common and authentication as securely transmitting information. The main department in research is identity authentication and setting up authenticated key. We try to put forward the secure scheme with smart card for Ad Hoc network. It can reduce the calculation and electricity consuming of mobility equipment efficiently. Perhaps it can be for our troops reference. 伍台國 2006 學位論文 ; thesis 82 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 94 === Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each world advanced country have got to understand that Information Warfare (IW) is the victorious foundation of wining war and proved technological leading one deciding the war since Gulf War. So all of them developed relevant technology actively. The protagonist of the IW is a fight of the network. Communication network is the important media that we have already transmitted the information at present. It is very momentous how to set up a perfect network security environment. It is the primary affair that how to confirm the identity both sides before exchanging the information through the network in IW. The confidential information transmitted needs protection according to the mutual transmission demand as the identities of both sides are verified correctly. It has already become the basic demand and followed that the identity verifies gradually for distributing a session key for both sides owning in common and authentication as securely transmitting information. The main department in research is identity authentication and setting up authenticated key. We try to put forward the secure scheme with smart card for Ad Hoc network. It can reduce the calculation and electricity consuming of mobility equipment efficiently. Perhaps it can be for our troops reference.
author2 伍台國
author_facet 伍台國
WANG JHIH PENG
王智鵬
author WANG JHIH PENG
王智鵬
spellingShingle WANG JHIH PENG
王智鵬
Authentication in Ad Hoc Networks for Information Warfare
author_sort WANG JHIH PENG
title Authentication in Ad Hoc Networks for Information Warfare
title_short Authentication in Ad Hoc Networks for Information Warfare
title_full Authentication in Ad Hoc Networks for Information Warfare
title_fullStr Authentication in Ad Hoc Networks for Information Warfare
title_full_unstemmed Authentication in Ad Hoc Networks for Information Warfare
title_sort authentication in ad hoc networks for information warfare
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/67960310304829071960
work_keys_str_mv AT wangjhihpeng authenticationinadhocnetworksforinformationwarfare
AT wángzhìpéng authenticationinadhocnetworksforinformationwarfare
AT wangjhihpeng zīxùnzhànshēnfēnshíbiézàiwúxiànsuíyìwǎnglùzhōngzhīyánjiū
AT wángzhìpéng zīxùnzhànshēnfēnshíbiézàiwúxiànsuíyìwǎnglùzhōngzhīyánjiū
_version_ 1716830300494888960