search query: @instructor Källström, Linda / total: 2
reference: 2 / 2
« previous | next »
Author: | Kurian, Jimmy |
Title: | Design and Implementation of an Authentication and Authorization Module for Service Access in Ad Hoc Networks |
Publication type: | Master's thesis |
Publication year: | 2005 |
Pages: | 13+77 Language: eng |
Department/School: | Tietotekniikan osasto |
Main subject: | Tietoliikenneohjelmistot ja -sovellukset (T-109) |
Supervisor: | Ylä-Jääski, Antti |
Instructor: | Kiravuo, Timo ; Källström, Linda |
OEVS: | Electronic archive copy is available via Aalto Thesis Database.
Instructions Reading digital theses in the closed network of the Aalto University Harald Herlin Learning CentreIn the closed network of Learning Centre you can read digital and digitized theses not available in the open network. The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/ You can read theses on the Learning Centre customer computers, which are available on all floors.
Logging on to the customer computers
Opening a thesis
Reading the thesis
Printing the thesis
|
Location: | P1 Ark Aalto | Archive |
Keywords: | ad hoc networks service access security AA authentication authorization access control |
Abstract (eng): | An ad hoc wireless network is a highly dynamic, self-organizing and adaptive network formed spontaneously, without the help of any infrastructure, between two or more devices equipped with wireless communications and networking capability. The users in ad hoc networks could provide services to each other. This introduces the requirement of a solution to control with whom a service access or request should be done. Traditional authentication and authorization solutions are not feasible in an infrastructure-less ad hoc network. This thesis consists of the requirement analysis, design, and implementation of an architecture, which provides authentication and authorization, for service access in ad hoc networks. The architecture is based on a de-centralized approach using identity certificates along with local access control policies which is combined with certificate extensions, user identification with public keys, and hierarchical structuring of keys. In this approach, users are authenticated rather than devices. The proposed architecture was proved to be feasible with a successful implementation. This thesis was done as part of the SESSI research project at Telecommunications Software and Multimedia Laboratory of Helsinki University of Technology. |
ED: | 2005-04-01 |
INSSI record number: 28243
+ add basket
« previous | next »
INSSI