Ad Hoc End to End Security Development

No Thumbnail Available
Journal Title
Journal ISSN
Volume Title
Helsinki University of Technology | Diplomityö
Checking the digitized thesis and permission for publishing
Instructions for the author
Date
2006
Major/Subject
Tietoverkkotekniikka
Mcode
S-38
Degree programme
Language
en
Pages
38
Series
Abstract
Security in ad hoc networks is a new topic being investigated quite extensively. The absence of a complete multi-purpose security design, which is required for a secured communication, makes this topic very attractive from the research point of view. This thesis explains the characteristics of mobile ad hoc networks that cause the need for new security protocols: a totally distributed, open, and self-managed wireless network makes a new paradigm that cannot reuse existing security solutions. This work summarizes the state of the art of security designs for end-to-end data transfer, in order to comment and analyse their characteristics and applicability. Finally, a new solution is proposed which is a combination of the two most important current approaches: Self-organized public-key management [9] and distributed 'threshold key management [10], in order to develop them, and to meet the requirements of purely self-managed ad hoc networks. The first approach is a simple solution that takes profit of human behaviour and trust as a source of authentication. The second approach is a mathematically rich algorithm based on Shamir's secret sharing [7] that automatically distributes keys and certificates in a secure way. By using these two protocols at the same time it is possible to reduce their drawbacks and to improve security and usability.
Description
Supervisor
Kantola, Raimo
Thesis advisor
Costa Requena, Jose M.
Keywords
Ad Hoc, threshold cryptography, network security
Other note
Citation