天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于Ad Hoc網(wǎng)絡(luò)的跨層協(xié)同安全保護(hù)機(jī)制研究

發(fā)布時(shí)間:2018-07-04 14:36

  本文選題:Ad + Hoc網(wǎng)絡(luò); 參考:《西安電子科技大學(xué)》2015年碩士論文


【摘要】:隨著移動(dòng)通信的高速發(fā)展,世界各國(guó)已經(jīng)對(duì)第五代移動(dòng)通信技術(shù)(5G)開展了多方面研究,但與之相關(guān)的安全技術(shù)研究卻相對(duì)滯后,5G網(wǎng)絡(luò)安全體系對(duì)安全提出了更高要求,必須提供更高和更多層次的安全機(jī)制和更多樣化的網(wǎng)絡(luò)安全解決方案。本文以Ad Hoc網(wǎng)絡(luò)為原型,重點(diǎn)研究5G移動(dòng)通信系統(tǒng)組合安全理論中的跨層協(xié)同安全技術(shù)。通過(guò)深入分析Ad Hoc網(wǎng)絡(luò)的特點(diǎn)與安全問(wèn)題,闡述了Ad Hoc網(wǎng)絡(luò)采用跨層設(shè)計(jì)的必要性,隨后在現(xiàn)有Ad Hoc網(wǎng)絡(luò)跨層設(shè)計(jì)方案的基礎(chǔ)上,從物理層、鏈路層、網(wǎng)絡(luò)層、應(yīng)用層深入研究目前存在的安全威脅與漏洞,找到亟需解決的關(guān)鍵問(wèn)題,進(jìn)而采用以跨層設(shè)計(jì)為基礎(chǔ),突出協(xié)同安全的理念,設(shè)計(jì)了一種自下而上的跨層協(xié)同安全保護(hù)機(jī)制。在方案具體設(shè)計(jì)中,首先從物理層安全出發(fā),計(jì)算通信節(jié)點(diǎn)保密容量,努力構(gòu)建完美保密通道,采用自適應(yīng)的物理層密鑰交換方案,完成物理層密鑰的安全生成與交換;其次針對(duì)物理層密鑰生成效率低,誤碼率高的特點(diǎn),應(yīng)用自同步序列密碼技術(shù)對(duì)物理層密鑰進(jìn)行拓展衍生,設(shè)計(jì)高效系統(tǒng)跨層密鑰發(fā)生器,實(shí)現(xiàn)密鑰跨層使用;最后,與網(wǎng)絡(luò)層和應(yīng)用層的系統(tǒng)通信協(xié)議相結(jié)合,利用以物理層密鑰為種子的系統(tǒng)密鑰序列加強(qiáng)各種系統(tǒng)通信協(xié)議的安全性,避免了多數(shù)主流的網(wǎng)絡(luò)協(xié)議攻擊方法。最終本文通過(guò)跨層協(xié)同安全設(shè)計(jì),解決了系統(tǒng)密鑰管理,通信安全等方面的關(guān)鍵技術(shù)問(wèn)題,實(shí)現(xiàn)了自下而上的系統(tǒng)協(xié)同安全保護(hù),構(gòu)建了Ad Hoc網(wǎng)絡(luò)跨層協(xié)同安全防御體系。
[Abstract]:With the rapid development of mobile communication, many countries have studied the fifth generation of mobile communication technology (5G), but the related security technology research is lagging behind. 5G network security system has put forward higher requirements for security. It is necessary to provide higher and more levels of security mechanism and a more diversified network security solution. Based on the Ad Hoc network, this paper focuses on the cross layer cooperative security technology in the combination security theory of 5G mobile communication system. Through the in-depth analysis of the characteristics and security problems of the Ad Hoc network, the necessity of the cross layer design of the Ad Hoc network is expounded. Then, on the basis of the existing cross layer design scheme of the existing Ad Hoc network, the physical layer is from the physical layer. The link layer, the network layer and the application layer deeply study the existing security threats and vulnerabilities and find the key problems that need to be solved. Then, based on the concept of cross layer design and highlight the concept of cooperative security, a top-down cross layer cooperative security protection mechanism is designed. In the specific design of the scheme, the physical layer security is the first step. The security capacity of communication nodes is calculated, the perfect secret channel is constructed, and the adaptive physical layer key exchange scheme is used to complete the security generation and exchange of the physical layer key. Secondly, the characteristics of the physical layer key generation efficiency are low and the bit error rate is high, and the self synchronization sequence cipher technology is used to expand the physical layer key, and the design is efficient. The system cross layer key generator is used to realize key cross layer use. Finally, it combines the system communication protocol of network layer and application layer to strengthen the security of various system communication protocols by using the system key sequence of physical layer key as the seed, avoiding most of the mainstream network protocol attack methods. Finally, this paper through cross layer cooperative security. The design has solved the key technical problems of system key management, communication security and so on. It realizes the system cooperative security protection from bottom to top, and constructs a cross layer cooperative security defense system of Ad Hoc network.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類號(hào)】:TN929.5

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 楊笑;范修斌;武傳坤;余玉銀;馮秀濤;;BOMM算法的密碼學(xué)性質(zhì)[J];軟件學(xué)報(bào);2012年07期

,

本文編號(hào):2096385

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2096385.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶efd80***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com