Authentication in Ad Hoc Networks for Information Warfare
碩士 === 國防管理學院 === 國防資訊研究所 === 94 === Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/67960310304829071960 |
id |
ndltd-TW-094NDMC1654015 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094NDMC16540152015-10-13T10:34:47Z http://ndltd.ncl.edu.tw/handle/67960310304829071960 Authentication in Ad Hoc Networks for Information Warfare 資訊戰身分識別在無線隨意網路中之研究 WANG JHIH PENG 王智鵬 碩士 國防管理學院 國防資訊研究所 94 Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each world advanced country have got to understand that Information Warfare (IW) is the victorious foundation of wining war and proved technological leading one deciding the war since Gulf War. So all of them developed relevant technology actively. The protagonist of the IW is a fight of the network. Communication network is the important media that we have already transmitted the information at present. It is very momentous how to set up a perfect network security environment. It is the primary affair that how to confirm the identity both sides before exchanging the information through the network in IW. The confidential information transmitted needs protection according to the mutual transmission demand as the identities of both sides are verified correctly. It has already become the basic demand and followed that the identity verifies gradually for distributing a session key for both sides owning in common and authentication as securely transmitting information. The main department in research is identity authentication and setting up authenticated key. We try to put forward the secure scheme with smart card for Ad Hoc network. It can reduce the calculation and electricity consuming of mobility equipment efficiently. Perhaps it can be for our troops reference. 伍台國 2006 學位論文 ; thesis 82 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防管理學院 === 國防資訊研究所 === 94 === Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each world advanced country have got to understand that Information Warfare (IW) is the victorious foundation of wining war and proved technological leading one deciding the war since Gulf War. So all of them developed relevant technology actively. The protagonist of the IW is a fight of the network. Communication network is the important media that we have already transmitted the information at present. It is very momentous how to set up a perfect network security environment.
It is the primary affair that how to confirm the identity both sides before exchanging the information through the network in IW. The confidential information transmitted needs protection according to the mutual transmission demand as the identities of both sides are verified correctly. It has already become the basic demand and followed that the identity verifies gradually for distributing a session key for both sides owning in common and authentication as securely transmitting information. The main department in research is identity authentication and setting up authenticated key. We try to put forward the secure scheme with smart card for Ad Hoc network. It can reduce the calculation and electricity consuming of mobility equipment efficiently. Perhaps it can be for our troops reference.
|
author2 |
伍台國 |
author_facet |
伍台國 WANG JHIH PENG 王智鵬 |
author |
WANG JHIH PENG 王智鵬 |
spellingShingle |
WANG JHIH PENG 王智鵬 Authentication in Ad Hoc Networks for Information Warfare |
author_sort |
WANG JHIH PENG |
title |
Authentication in Ad Hoc Networks for Information Warfare |
title_short |
Authentication in Ad Hoc Networks for Information Warfare |
title_full |
Authentication in Ad Hoc Networks for Information Warfare |
title_fullStr |
Authentication in Ad Hoc Networks for Information Warfare |
title_full_unstemmed |
Authentication in Ad Hoc Networks for Information Warfare |
title_sort |
authentication in ad hoc networks for information warfare |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/67960310304829071960 |
work_keys_str_mv |
AT wangjhihpeng authenticationinadhocnetworksforinformationwarfare AT wángzhìpéng authenticationinadhocnetworksforinformationwarfare AT wangjhihpeng zīxùnzhànshēnfēnshíbiézàiwúxiànsuíyìwǎnglùzhōngzhīyánjiū AT wángzhìpéng zīxùnzhànshēnfēnshíbiézàiwúxiànsuíyìwǎnglùzhōngzhīyánjiū |
_version_ |
1716830300494888960 |