search query: @keyword network security / total: 17
reference: 9 / 17
Author: | Huguet Prunera, Josep |
Title: | Ad Hoc End to End Security Development |
Publication type: | Master's thesis |
Publication year: | 2006 |
Pages: | 38 Language: eng |
Department/School: | Sähkö- ja tietoliikennetekniikan osasto |
Main subject: | Tietoverkkotekniikka (S-38) |
Supervisor: | Kantola, Raimo |
Instructor: | Costa Requena, Jose M. |
OEVS: | Electronic archive copy is available via Aalto Thesis Database.
Instructions Reading digital theses in the closed network of the Aalto University Harald Herlin Learning CentreIn the closed network of Learning Centre you can read digital and digitized theses not available in the open network. The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/ You can read theses on the Learning Centre customer computers, which are available on all floors.
Logging on to the customer computers
Opening a thesis
Reading the thesis
Printing the thesis
|
Location: | P1 Ark S80 | Archive |
Keywords: | Ad Hoc threshold cryptography network security |
Abstract (eng): | Security in ad hoc networks is a new topic being investigated quite extensively. The absence of a complete multi-purpose security design, which is required for a secured communication, makes this topic very attractive from the research point of view. This thesis explains the characteristics of mobile ad hoc networks that cause the need for new security protocols: a totally distributed, open, and self-managed wireless network makes a new paradigm that cannot reuse existing security solutions. This work summarizes the state of the art of security designs for end-to-end data transfer, in order to comment and analyse their characteristics and applicability. Finally, a new solution is proposed which is a combination of the two most important current approaches: Self-organized public-key management [9] and distributed 'threshold key management [10], in order to develop them, and to meet the requirements of purely self-managed ad hoc networks. The first approach is a simple solution that takes profit of human behaviour and trust as a source of authentication. The second approach is a mathematically rich algorithm based on Shamir's secret sharing [7] that automatically distributes keys and certificates in a secure way. By using these two protocols at the same time it is possible to reduce their drawbacks and to improve security and usability. |
ED: | 2007-03-16 |
INSSI record number: 33279
+ add basket
INSSI