Loading...

Key Management for Large Scale Mobile Ad-hoc Networks

Gharib, Mohammed | 2015

768 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 47828 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Movaghar Rahimabadi, Ali
  7. Abstract:
  8. Mobile ad hoc networks have been attracted the attention of many researchers during last years. One of the major concerns faces such networks is the security issue. The root of this concern is the fact that the intermediate nodes have the responsibility of packet transportation and forwarding. The nodes inside the mobile ad hoc networks assumed to be trusty while they can read, change or drop the transported packets. Cryptography as the cornerstone of the security could be play an essential role in such networks. Any cryptosystem need some keys to be able to secure communications. In large scale mobile ad hoc networks storing the whole keys in all nodes is inefficient, if possible, due to the MANET’s limitations in storage, energy and processing capability. In this thesis, considering MANET limitations and characteristics, two key management algorithms are proposed. The first one is a probabilistic asymmetric key management based on key pre-distribution. We analytically prove that storing just a few keys in each node, keeps the network connected with very high probability. Such an idea faces many concerns and issues including routing problem, path length, the amount of traffic generated by the proposed algorithm and etc. In this thesis efficient solutions are proposed for the whole issues and concerns. The second proposed key management system is a fully distributed key management built based on the identity based cryptosystems, eliminating the need for storing keys. Both of proposed algorithms are analyzed analytically and compared with the recently proposed literature works, using simulation. Results show superiority of both of the proposed key management systems in comparison with the related works in both security strength and performance aspects
  9. Keywords:
  10. Network Security ; Cryptography ; Key Management ; Mobile Ad Hoc Network

 Digital Object List

 Bookmark

...see more