节点文献
移动自组网络组密钥管理关键技术研究
Research of Group Key Management in Mobile Ad Hoc Networks
【作者】 况晓辉;
【导师】 卢锡城;
【作者基本信息】 国防科学技术大学 , 计算机科学与技术, 2003, 博士
【摘要】 无线网络为用户提供了在任意时间和地点进行通信和信息获取、并在移动中保持通信连接的能力。传统的移动通信系统一般通过基站为用户提供网络接入服务,而基站则往往通过有线骨干网互连起来。移动自组网络是由移动节点通过分布式协议自组织起来的一种无线网络,网络中可以没有基站等固定的路由设施。当有线网络不可使用时,如在战场通讯和紧急救援等任务中,移动自组网络提供了一种可行的地面通信和信息存取技术。 安全是移动自组网络中的基本问题,也是当前该领域的研究热点之一。目前,移动自组网络安全技术较为集中的研究领域包括安全路由技术、安全组通信技术、认证技术以及密钥管理技术等。在移动自组网络中,组密钥管理具有重要的应用——不但安全组通信需要组密钥管理技术的支持,安全路由中的密钥管理问题也可认为是所有节点均为一个通信组的组密钥管理问题。因此研究解决移动自组网络组密钥管理问题具有重要的意义。然而,目前的研究工作存在许多不足:现有的组密钥管理框架大多依赖固定节点生成或分发密钥;包括协商算法在内的组密钥更新算法在移动自组网络中的性能有待提高;缺乏对大规模移动自组网络安全广播的研究等。 本文在分析移动自组网络组密钥管理面临的挑战以及现有工作不足的基础上,深入研究了敌对环境下集中部署的移动自组网络中组密钥管理的关键问题——密钥信息的部署问题、信任模型问题、组密钥生成与更新问题以及密钥的一致性问题等,并在此基础上研究了特殊组通信方式——广播通信的密钥管理问题。本文主要工作包括: 1) 组密钥管理框架研究 当前的研究工作侧重于具有固定节点或可靠连接的移动自组网络密钥管理问题,而对所有节点均可移动的自组网络密钥管理问题研究很少,因此本文在分析敌对环境下所有节点均可移动的自组网络组通信安全需求的基础上,针对网络拓扑结构频繁变化、链路稳定性差、带宽有限以及无可信第三方等特点,并通过研究移动自组网络组密钥管理信任模型,提出了基于门限秘密共享机制的分布式组密钥管理框架,定义了组通信密钥的生成方式,提出了分布式组密钥生成算法;同时在组密钥定义的基础上提出基于分布式组密钥管理框架的组密钥一致性问题的解决方法——基于序列的组密钥更新方法。由于该框架采用局部信任模型,组密钥利用局部信息生成,因此具有对网络拓扑变化适应性强、扩展性好、鲁棒性强等优点,避免了组密钥管理的单点失效问题,降低了节点移动性和链路可靠性对于组密钥管理的影响。 2) 组密钥更新算法研究 为了保证组通信的安全性,使组通信满足前向私密性和后向私密性,当节点加入、退出组时均需要更新组密钥。因此,高效、安全的组密钥更新算法对于安全组通信至关重要。针对现有的组密钥更新机制的效率问题,本文基于分布式组密钥管理框架,将组密钥更新国防科学技术大学研究生院学位论文问题抽象为简单无向图的k阶最优划分问题,并提出了两种组密钥更新算法:DGR算法和RCDGR算法,它们均利用局部密钥信息更新组密钥,对于移动自组网络拓扑结构变化频繁、连接短暂以及带宽有限等特点具有良好的适应性。利用网络模拟器ns一2,本文分析了提出的组密钥更新算法的性能,模拟结果表明在多种移动自组网络条件下本文提出的组密钥更新算法的组密钥更新延迟和成功率优于CKD、GDHv.2以及BD等。 3)广播通信的密钥管理算法研究 在移动自组网络中,广播是一种重要的通信方式,在路由、簇生成和维护等网络技术中具有重要的应用。针对大规模移动自组网络广播通信的安全性问题,本文将广播视为一种所有网络节点属于同一个组的组通信方式,利用组密钥管理框架的研究成果解决广播通信的安全问题。为提高网络的可扩展性,本文首先研究了移动自组网络簇生成算法,解决如何在敌对环境下高效、安全地建立层次结构的问题;在此基础上研究了通信密钥的更新问题,解决网络节点变化时广播通信的安全问题。.安全簇生成算法 针对现有簇生成算法对节点相对移动性和组移动模型考虑不足,未考虑不可信网络的簇生成的安全性等问题,本文首先提出了基于链路稳定度的簇生成算法(人亿SC月),该算法以链路稳定度作为簇首选举的标准,充分利用稳定链路生成簇结构,使簇结构具有良好的稳定性。然后,本文分析了敌对环境下簇生成算法的安全需求,对五在习C火算法进行了安全增强,提出了基于稳定链路数的安全簇生成算法活彻亿召C月)。该算法不但具有较好的性能,而且能够有效防止恶意节点对簇结构的破坏,同时能在一定程度上检测并剔除合谋节点,保证簇结构的安全性。在ns一2网络模拟器上,本文实现了MLSCA、SMLSCA、Lowest一In、we^、Lowest一SPEEn、Mix以及Max一negree等簇生成算法,分别比较了它们在不同移动模型、网络规模、移动速度以及通信能力等条件下的性能。模拟结果验证了本文提出的MLSCA、SMSLCA算法的有效性。.基于稳定簇的组密钥更新算法 为了保证簇生成以及广播通信的安全性,本文在分布式组密钥管理框架、安全簇生成算法的基础上,提出了一种基于稳定簇的分布式组密钥更新算法(SC
【Abstract】 Wireless networks provide users with the capability of ubiquitous computing and information access at anytime, as well as connection maintenance for mobile users. Users are connected to a network via base stations in traditional mobile communication systems and a wired backbone is often designed to carry the information transmitted among the base stations. A mobile ad hoc network (MANET) is a special wireless network that is self-organized by mobile nodes communicating with each other using distributed protocols. MANET can function in absence of fixed infrastructures, such as base stations. When wired networks are not available, as in battlefield communication and emergency search-and-rescue scenarios, MANETs provide a feasible way for communication and information access.Security is essential for MANET, and it is also one of the hot areas in MANET research nowadays. Currently, the major sub-areas of security research include secure routing, secure group communications, authentication and group key management etc, among which group key management has extensive applications. For example, the technologies of group key management can be applied to secure routing and secure group communication. Actually secure problem in routing can be treated as a secure group communication problem with all the nodes in the same group. So group key management has become a research hotpot. However, some limitations do exist: almost all existing group management frameworks depend on fixed nodes to generate or distribute group keys; the performance of group rekeying algorithms including the key agreement algorithm needs to be improved in mobile ad hoc networks; and little research has been done on the security problem in broadcasts.By analyzing the requirements of MANET group key management and some limitations of existing work, this dissertation first focuses on the problems of key deployment, group key generation, group rekeying and group key consistency in a hostile environment. Then the security problem of a special kind of group communication - broadcast is also studied.The major contributions of this thesis include:0 Research on group key management frameworkThe topology of MANET can change frequently since all communicating nodes can move unpredictably. Multi-hop communication over error-prone wireless channels exposes the transmission to high loss rate. Due to the limitation of the existing work in group key management of MANET, this dissertation first analyzes security requirements of MANET group communication in a hostile environment, and then proposes a novel group key management framework based on the threshold secret sharing mechanism. In this framework, a generation style of group key is defined and a generation algorithm is proposed. At the same time, the TEK consistency problem is also solved in the framework. Since localized trust model is used and multiple nearby members can collaborate to generate a group key, the framework has good adaptability to frequent topoloty changes, robustness and scalability, also it advoids single pointof failure. And the group key generation in the framework influenced a little by mobility of nodes and error-prone wireless channels.El Research on group rekeying algorithmIn order to meet the forward-secrecy and the backward-secrecy polices, any change in the group membership should induce group rekeying. So how to update group-key securely and efficiently is of crucial importance in secure group communication. Based on our group key management framework, group rekeying can be reduced as the k rank minimum partition problem in graph theory. Two approximate algorithms are proposed in this dissertation: Distributed Group Rekeying Algorithm (DGR) and Random Cluster Distributed group Rekeying Algorithm (RCDGR). Both of them generate group key from local secrete information and are very suitable for MANET, which possesses characteristics of frequently changing network topology, limited bandwidth and short-lived connection. The performances of the two algorithms are studied using network simulator (n
【Key words】 mobile ad hoc network; wireless network; group communication; group key management; group rekeying; clustering; simulation;