Efficient and secure self organized key management in mobile adhoc network모바일 애드혹 네트워크에서의 효율적이고 안전한 자기조직적 키관리 기법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 550
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorYoon, Hyun-Soo-
dc.contributor.advisor윤현수-
dc.contributor.authorChoi, Dae-Seon-
dc.contributor.author최대선-
dc.date.accessioned2011-12-13T05:26:59Z-
dc.date.available2011-12-13T05:26:59Z-
dc.date.issued2009-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=309346&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/33270-
dc.description학위논문(박사) - 한국과학기술원 : 전산학전공, 2009.2, [ viii, 74 p. ]-
dc.description.abstractThis paper presents two fully self-organized key management schemes for mobile ad hoc networks. Unlike most previous schemes, there is no priori shared secret or no priori trust relationship in the proposed scheme; every node plays the same role and carries out the same function of key management. The certificate request scheme consists of Handshaking (HS) and Certificate Request/Reply (CRR) procedures. In HS, a node acquires the public key of the approaching node via a secure side channel, and each node makes and stores the other node’s public key certificate. In CRR, a node requests a remote node’s certificates via a radio channel to the other nodes that it has HSed. The certificate retrieval scheme includes HS and Certificate Retrieval (CR) procedure. In HS, each node makes the other node’s certificate and gives it to the node. In CR, a node requests a remote node’s certificates to the remote node. The certificates are issued by other nodes that had HSed the remote node. In both schemes, the node verifies the received certificates with the public keys acquired by HS. If the number of received valid certificates that contain the same public key exceeds a given threshold, the node accepts the remote node’s public key as valid. Certificate revocation methods are also presented in both schemes. Security is rigorously analyzed against various known attacks. Performance and network costs are intensively analyzed mathematically. Using this analysis, parameter selection guidelines to optimize performance and security for diverse cases are proposed. Simulation results show that every node acquires the public keys of all other nodes at least 5 times faster than in a previous scheme. Features of proposed schemes are analyzed and compared with previous methods. Additional considerations for applying the proposed schemes to other special area are also presented.eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectAd hoc Network-
dc.subjectSecurity-
dc.subjectKey Management-
dc.subjectSelf Orgainzed-
dc.subject애드혹 네트워크-
dc.subject보안-
dc.subject키관리-
dc.subject자기조직적-
dc.subjectAd hoc Network-
dc.subjectSecurity-
dc.subjectKey Management-
dc.subjectSelf Orgainzed-
dc.subject애드혹 네트워크-
dc.subject보안-
dc.subject키관리-
dc.subject자기조직적-
dc.titleEfficient and secure self organized key management in mobile adhoc network-
dc.title.alternative모바일 애드혹 네트워크에서의 효율적이고 안전한 자기조직적 키관리 기법-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN309346/325007 -
dc.description.department한국과학기술원 : 전산학전공, -
dc.identifier.uid020035300-
dc.contributor.localauthorYoon, Hyun-Soo-
dc.contributor.localauthor윤현수-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0