We use cookies to improve your experience with our site.

采用分级钥匙方案的Ad Hoc网络内群路由鉴定

Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme

  • 摘要: 有别于传统有线网络,由于无线行动设备的移动特性,使得它可任意形成毫无基础结构的随意行动网络(ad hoc networks),这也意味着随意行动网络结构上很难存在固定可存取的信任服务器。尽管目前已经存在许多有线网络上安全管理机制,但是在一个开放而无法确认是否安全可信任的集中式主机环境下,运用传统有线网络的公开金钥管理基础结构(Public Key Infrastructure)在随意行动网络上将容易产生许多安全上的问题。在本研究中我们提出了具备弹性与可规划性的金钥管理机制并结合丛集基础安全路由协定(Cluster-Based Secure Routing Protocol)来增强路由的安全性与不可否认性。在内部丛集中,我们采用识别基础(ID-based)的机制作为内部路由认证来提高路由的效能与安全。而外部丛集之间,此研究所提出的安全路由协定除可跨越内部与外部丛集之外,更可达到丛集与丛集组织间(inter-cluster)的安全路由。所提的丛集(cluster-based)金钥安全管理机制结构中,本研究运用门槛机制(threshold scheme)将金钥与凭证中心(Certificate Authority)的运算分散在多个无线网络节点上,避免系统被入侵后CA所存贮的凭证与机密资料全部外泄。此外,透过门槛机制除可减轻集中式CA的运算负担、避免存贮大量凭证信息之外,更可避免单点泄密或失败(single point of compromised or failure)的容错功能,进而使得具有大量行动通讯节点的随意网络具备更强健的能力来抵挡网络上具有蓄意攻击行为的节点。

     

    Abstract: Dissimilar to traditional networks, the features of mobilewireless devices that can actively form a network without anyinfrastructure mean that mobile ad hoc networks frequently displaypartition due to node mobility or link failures. These indicate that anad hoc network is difficult to provide on-line access to a trustedauthority server. Therefore, applying traditional Public KeyInfrastructure (PKI) security framework to mobile ad hoc networks willcause insecurities. This study proposes a scalable and elastic keymanagement scheme integrated into Cluster Based Secure Routing Protocol(CBSRP) to enhance security and non-repudiation of routingauthentication, and introduces an ID-Based internal routingauthentication scheme to enhance the routing performance in an internalcluster. Additionally, a method of performing routing authenticationbetween internal and external clusters, as well as inter-clusterrouting authentication, is developed. The proposed cluster-based keymanagement scheme distributes trust to an aggregation of cluster headsusing a threshold scheme faculty, provides Certificate Authority (CA)with a fault tolerance mechanism to prevent a single point ofcompromise or failure, and saves CA large repositories from maintainingmember certificates, making ad hoc networks robust to maliciousbehaviors and suitable for numerous mobile devices.

     

/

返回文章
返回