Research on Communication Protocol Agreement Based on Ad Hoc Network

Article Preview

Abstract:

Routing technology is the key technology of Ad Hoc network and is one of the most important factors influencing overall performance of network. Routing protocol has not adapted to topological structure of dynamic change for Ad Hoc network, so the new Ad Hoc routing protocol must be designed. The paper starts from the basic concept of Ad Hoc network and proposes an effective key protocol agreement in Ad Hoc network based on bilinear pairing and hierarchical routing protocol which not only makes logical key agreement model correspond to topological structure of actual network , but also supports the establishment and dynamic update of initial group of key and has less communication traffic. The performance analysis indicates that the protocol proposed in the paper is very effective on the network with larger range, stronger ability of equipment process and worse communication environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3574-3578

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ye Ayong, X. Li. Research on strategy of traffic safety of Ah Hoc network. Microcomputer Applications , 2004, 25(4): 385-390.

Google Scholar

[2] M. W Xu., Dong X.H., K. Xu. Research development on multicast key management. Journal of Software, 2004, 15(1): 141-150.

Google Scholar

[3] T. Camp, J. Boleng, V. Davies. Mobility models for ad hoc network research Wireless Communications and Mobile Computing(WCMC), Special issue on Mobile Ad Hoc Networking. Research, Trends and Applications, 2002, 132-140.

DOI: 10.1002/wcm.72

Google Scholar

[4] M. Steiner. Secure Group Key Agreement. Natur wissens chaftlich Technis chen Fakult at des Saarlandes. Ider Universit, 2001, 16-30.

Google Scholar

[5] M. Steiner, G. Tsudik, M. Waidner. CLIQUES. A New Approach to Group Key Agreement. IEEE Computer Society. 1998, 10(6): 380-387.

DOI: 10.1109/icdcs.1998.679745

Google Scholar

[6] M. Steiner, G. Tsudik, M. Waidner. Key Agreement in Dynamic Peer Groups. IEEE Trans Parallel Distribution System. 2000, 11(8): 769–780.

DOI: 10.1109/71.877936

Google Scholar

[7] Diffie W, Hellman EW. New directions in cryptography. IEEE Trans Information Theory, 1976, 6: 644-654.

DOI: 10.1109/tit.1976.1055638

Google Scholar

[8] Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOM Computer Communication Review. New York: ACM Press, 1997. 277-288.

DOI: 10.1145/263109.263179

Google Scholar

[9] Z.W. Wang, D.W. Gu. Group key agreement protocol based on tree structure and threshold idea . Journal of Software, 2004, 15(6): 924-927.

Google Scholar

[10] Y. Wang, M. Li, Y.D. Cao. A dynamic group key agreement protocol. Application Research Of Computers, 2005, 10(9): 118-120.

Google Scholar

[11] Y. Wang, M. Li, Y.D. Cao. Authentication group key agreement protocol based on identity and trigeminal tree. Computer Engineering and Applications, 2005, 20(24): 134-137.

Google Scholar