Ad Hoc End to End Security Development
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.advisor | Costa Requena, Jose M. | |
dc.contributor.author | Huguet Prunera, Josep | |
dc.contributor.department | Sähkö- ja tietoliikennetekniikan osasto | fi |
dc.contributor.school | Teknillinen korkeakoulu | fi |
dc.contributor.school | Helsinki University of Technology | en |
dc.contributor.supervisor | Kantola, Raimo | |
dc.date.accessioned | 2020-12-05T10:29:20Z | |
dc.date.available | 2020-12-05T10:29:20Z | |
dc.date.issued | 2006 | |
dc.description.abstract | Security in ad hoc networks is a new topic being investigated quite extensively. The absence of a complete multi-purpose security design, which is required for a secured communication, makes this topic very attractive from the research point of view. This thesis explains the characteristics of mobile ad hoc networks that cause the need for new security protocols: a totally distributed, open, and self-managed wireless network makes a new paradigm that cannot reuse existing security solutions. This work summarizes the state of the art of security designs for end-to-end data transfer, in order to comment and analyse their characteristics and applicability. Finally, a new solution is proposed which is a combination of the two most important current approaches: Self-organized public-key management [9] and distributed 'threshold key management [10], in order to develop them, and to meet the requirements of purely self-managed ad hoc networks. The first approach is a simple solution that takes profit of human behaviour and trust as a source of authentication. The second approach is a mathematically rich algorithm based on Shamir's secret sharing [7] that automatically distributes keys and certificates in a secure way. By using these two protocols at the same time it is possible to reduce their drawbacks and to improve security and usability. | en |
dc.format.extent | 38 | |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/94420 | |
dc.identifier.urn | URN:NBN:fi:aalto-2020120553254 | |
dc.language.iso | en | en |
dc.programme.major | Tietoverkkotekniikka | fi |
dc.programme.mcode | S-38 | fi |
dc.rights.accesslevel | closedAccess | |
dc.subject.keyword | Ad Hoc | en |
dc.subject.keyword | threshold cryptography | en |
dc.subject.keyword | network security | en |
dc.title | Ad Hoc End to End Security Development | en |
dc.type.okm | G2 Pro gradu, diplomityö | |
dc.type.ontasot | Master's thesis | en |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.type.publication | masterThesis | |
local.aalto.digiauth | ask | |
local.aalto.digifolder | Aalto_32027 | |
local.aalto.idinssi | 33279 | |
local.aalto.openaccess | no |