DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yoon, Hyun-Soo | - |
dc.contributor.advisor | 윤현수 | - |
dc.contributor.author | Choi, Dae-Seon | - |
dc.contributor.author | 최대선 | - |
dc.date.accessioned | 2011-12-13T05:26:59Z | - |
dc.date.available | 2011-12-13T05:26:59Z | - |
dc.date.issued | 2009 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=309346&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/33270 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 전산학전공, 2009.2, [ viii, 74 p. ] | - |
dc.description.abstract | This paper presents two fully self-organized key management schemes for mobile ad hoc networks. Unlike most previous schemes, there is no priori shared secret or no priori trust relationship in the proposed scheme; every node plays the same role and carries out the same function of key management. The certificate request scheme consists of Handshaking (HS) and Certificate Request/Reply (CRR) procedures. In HS, a node acquires the public key of the approaching node via a secure side channel, and each node makes and stores the other node’s public key certificate. In CRR, a node requests a remote node’s certificates via a radio channel to the other nodes that it has HSed. The certificate retrieval scheme includes HS and Certificate Retrieval (CR) procedure. In HS, each node makes the other node’s certificate and gives it to the node. In CR, a node requests a remote node’s certificates to the remote node. The certificates are issued by other nodes that had HSed the remote node. In both schemes, the node verifies the received certificates with the public keys acquired by HS. If the number of received valid certificates that contain the same public key exceeds a given threshold, the node accepts the remote node’s public key as valid. Certificate revocation methods are also presented in both schemes. Security is rigorously analyzed against various known attacks. Performance and network costs are intensively analyzed mathematically. Using this analysis, parameter selection guidelines to optimize performance and security for diverse cases are proposed. Simulation results show that every node acquires the public keys of all other nodes at least 5 times faster than in a previous scheme. Features of proposed schemes are analyzed and compared with previous methods. Additional considerations for applying the proposed schemes to other special area are also presented. | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Ad hoc Network | - |
dc.subject | Security | - |
dc.subject | Key Management | - |
dc.subject | Self Orgainzed | - |
dc.subject | 애드혹 네트워크 | - |
dc.subject | 보안 | - |
dc.subject | 키관리 | - |
dc.subject | 자기조직적 | - |
dc.subject | Ad hoc Network | - |
dc.subject | Security | - |
dc.subject | Key Management | - |
dc.subject | Self Orgainzed | - |
dc.subject | 애드혹 네트워크 | - |
dc.subject | 보안 | - |
dc.subject | 키관리 | - |
dc.subject | 자기조직적 | - |
dc.title | Efficient and secure self organized key management in mobile adhoc network | - |
dc.title.alternative | 모바일 애드혹 네트워크에서의 효율적이고 안전한 자기조직적 키관리 기법 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 309346/325007 | - |
dc.description.department | 한국과학기술원 : 전산학전공, | - |
dc.identifier.uid | 020035300 | - |
dc.contributor.localauthor | Yoon, Hyun-Soo | - |
dc.contributor.localauthor | 윤현수 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.