1. Security model of wireless ad hoc network based on ADHOC-ECDSA algorithm.
- Author
-
Wang, Bin, Li, Zhongyuan, Maehle, Erik, Stoll, Norbert, and Chu, Chao-Hsien
- Subjects
- *
AD hoc computer networks , *COMPUTER network security , *INVESTMENT analysis , *ELLIPTIC curves , *ROUTING algorithms , *ALGORITHMS - Abstract
Wireless ad hoc network is popular in the research direction of network, and it has quite good application foreground in both civil and military aspect. However, traditional network and wireless ad hoc network distinguishes from one another on self-organization, which leads to a new problem, that traditional network security protection technology cannot be applied directly. Now whether wireless ad hoc network can be applied and popularized, and whether safe wireless ad hoc network can be constructed to ensure its security becomes vital. In this paper, the author assumes that a model based on ADHOC-ECDSA algorithm can cover all problems, including identity authentication combined with allocation address. Then we can modify basic algorithm by applying elliptic curve, and complete safety single hop, or even complete safety multi hop based on the algorithm of routing security protocol. In this paper, by analyzing the research progress of the network and its requirements of security protection, and by applying testing machine to prevent invasion, we present specific model design plan and analysis of security protection. In the mean time, popularization of wireless ad hoc network becomes possible. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF