31 |
Key management in mobile ad hoc networks.Van der Merwe, Johann. January 2005 (has links)
Mobile ad hoc networks (MANETs) eliminate the need for pre-existing infrastructure by relying on the nodes to perform all network services. The connectivity between the nodes is sporadic due to the shared, error-prone wireless medium and frequent route failures caused by node mobility. Fully self-organized MANETs are created solely by the end-users for a common purpose in an ad hoc fashion. Forming peer-to-peer security associations in MANETs is more challenging than in conventional networks due to the lack of central authority. This thesis is mainly concerned with peer- t o-peer key management in fully self-organized M ANETs. A key management protocol’s primary function is to bootstrap and maintain the security associations in the network, hence to create, distribute and revocate (symmetric or asymmetric) keying material as needed by the network security services. The fully self-organized feature means that t he key management protocol cannot rely on any form of off-line or on-line trusted third party (TTP). The first part of the thesis gives an introduction to MANETs and highlights MANETs' main characteristics and applications. The thesis follows with an overall perspective on the security issues in MANETs and motivates the importance of solving the key management problem in MANETs. The second part gives a comprehensive survey on the existing key management protocols in MANETs. The protocols are subdivided into groups based on their main characteristic or design strategy. Discussion and comments are provided on the strategy of each group. The discussions give insight into the state of the art and show researchers the way forward. The third part of the thesis proposes a novel peer- to-peer key management scheme for fully self-organized MANETs, called Self-Organized Peer-to-Peer Key Management (SelfOrgPKM). The scheme has low implementation complexity and provides self-organized mechanisms for certificate dissemination and key renewal without the need for any form of off-line or on-line authority. The fully distributed scheme is superior in communication and computational overhead with respect to its counterparts. All nodes send and receive the same number of messages and complete the same amount of computation. ScifOrgPKM therefore preserves the symmetric relationship between the nodes. Each node is its own authority domain which provides an adversary with no convenient point of attack. SelfOrgPKM solves t he classical routing-security interdependency problem and mitigates impersonation attacks by providing a strong one-to-one binding between a user’s certificate information and public key. The proposed scheme uses a novel certificate exchange mechanism t hat exploits user mobility but does not rely on mobility in anyway. The proposed certificate exchange mechanism is ideally suited for bootstraping the routing security. It enables nodes to setup security associations on the network layer in a localized fashion without any noticeable time delay. The thesis also introduces two generic cryptographic building blocks as the basis of SelfOrgPKM: 1) A variant on the ElGamal type signature scheme developed from the generalized ElGamal signature scheme introduced by Horster et al. The modified scheme is one of the most efficient ElGamal variants, outperforming most other variant s; and 2) A subordinate public key generation scheme. The thesis introduces t he novel notion of subordinate public keys, which allows the users of SelfOrgPKM to perform self-organized, self-certificate revocation without changing their network identifiers / addresses. Subordinate public keys therefore eliminate the main weakness of previous efforts to solve the address ownership problem in Mobile IPv6. Furthermore, the main weakness of previous efforts to break t he routing-security interdependence cycle in MANETs is also eliminated by a subordinate public key mechanism. The presented EIGamal signature variant is proved secure in t he Random Oracle and Generic Security Model (ROM+ GM ) without making any unrealistic assumptions . It is shown how the strong security of the signature scheme supports t he security of t he proposed subordinate key generation scheme. Based on the secure signature scheme a security argument for SelfOrgPKM is provided with respect to a genera l, active insider adversary model. The only operation of SelfOrgPKM affecting the network is the pairwise exchange of certificates. The cryptographic correctness, low implementation complexity and effectiveness of SelfOrgPKM were verified though extensive simulations using ns-2 and OpenSSL. Thorough analysis of the simulation results shows t hat t he localized certificate exchange mechanism on the network layer has negligible impact on network performance. The simulation results also correlate with efficiency analysis of SelfOrgPKM in an ideal network setting, hence assuming guaranteed connectivity. The simulation results furthermore demonstrate that network layer certificate exchanges can be triggered without extending routing protocol control packet. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2005.
|
32 |
The development of a dynamically configured wireless ad-hoc multihop network protocol /Pretorius, Wynand. January 2006 (has links)
Thesis (MScIng)--University of Stellenbosch, 2006. / Bibliography. Also available via the Internet.
|
33 |
Multicast security in mobile ad hoc networks /Nguyen, Hoang Lan. January 2006 (has links)
Thesis (M.Sc.)--York University, 2006. Graduate Programme in Computer Science. / Typescript. Includes bibliographical references (leaves81-86). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://proquest.umi.com/pqdweb?index=4&did=1240708341&SrchMode=1&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1194977884&clientId=5220
|
34 |
Strategic message forwarding on wireless ad-hoc networks /Lai, Kai-Ming. January 2008 (has links)
Thesis (M.Phil.)--Hong Kong University of Science and Technology, 2008. / Includes bibliographical references (leaves 66-68). Also available in electronic version.
|
35 |
Self-configuring ad-hoc networks for unmanned aerial systemsChristmann, Hans Claus. January 2008 (has links)
Thesis (M. S.)--Aerospace Engineering, Georgia Institute of Technology, 2008. / Committee Chair: Johnson, Eric N.; Committee Member: Feron, Eric M. J.; Committee Member: Pritchett, Amy R.
|
36 |
On the performance of probabilistic flooding in wireless mobile ad hoc networksBani Yassein, Muneer O. January 2006 (has links)
Thesis (Ph.D.) - University of Glasgow, 2006. / Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, University of Glasgow, 2006. Includes bibliographical references. Print version also available.
|
37 |
A discovery process for initializing ad hoc underwater acoustic networksOng, Chee Wei. January 2008 (has links) (PDF)
Thesis (M.S. in Engineering Acoustics)--Naval Postgraduate School, December 2008. / Thesis Advisor(s): Rice, Joseph A. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 89-91). Also available in print.
|
38 |
Practical consideration of routing protocols in ad hoc networksYang, Junmo. Sun, Min-Te. January 2006 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2006. / Abstract. Includes bibliographic references (p.93-99).
|
39 |
Synergy MAC a cooperative MAC protocol /Kulkarni, Santosh B., Umphress, David A., Agrawal, Prathima, January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 61-63).
|
40 |
Learning-based route management in wireless ad hoc networksRussell, Brian. January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Computer Science." Includes bibliographical references (p. 121-124).
|
Page generated in 0.2637 seconds