用户名: 密码: 验证码:
战术互联网网络结构和密钥管理研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
战术互联网是一种以Ad Hoc网络技术为基础,无中心、自组织、多跳共享的无线网络。作为一种新型的无线移动网络,战术互联网以其特有的无需事先架设网络设施、可快速展开、抗毁性好等特点,其军事应用价值无庸置疑,在外军已得到广泛使用。由于我国对Ad Hoc网络的研究起步晚,一些技术尚待解决,Ad Hoc技术在我军战术网络中还未有成熟应用。本文在分析战术互联网的组成与连接关系的基础上,结合我军通信装备的技术现状,针对战术互联网的网络结构和密钥管理展开研究,应用OPNET网络仿真软件,对我军战术互联网进行了建模与仿真研究,重点研究网络结构变化对战术互联网的性能影响,为我军战术互联网建设和性能评估提供技术支持,保障在数字化战场条件下战术互联网的稳定运行,实现“打得赢”的目标。
     (1)在总结战术互联网组成、连接关系和技术特点的基础上,分析了战术互联网的业务要求、技术要求和军事要求。结合战术互联网在技术和实施层面上存在的固有问题,提出战术互联网建设应根据我军通信装备的技术现状,首先解决好网络架构和密钥管理等关键技术。
     (2)在分析外军应用较为成熟的战术互联网网络架构的基础上,提出我军战术互联网建设应采用多层多级网络架构。多层多级战术互联网架构既可保证低级单位甚至单兵在不需要使用太多资源的前提下群内正常通信的需要,又可满足特殊情况下的跨层越级指挥和协同指挥的通信需求。
     (3)以多层多级战术互联网结构为研究对象,结合战术互联网固有的安全问题和目标要求,提出了一种新型的分布式集中式密钥管理方案,符合部队战术网络的安全要求。
     (4)利用OPNET仿真工具建立了两套简单的战术互联网节点模型,分别对不同的网络规模、节点运动速度和网络负载等进行了仿真,获得了端到端时延、媒体接入时延、网络延时、网络负载、网络开销、接收误码率等网络性能参数。本文是对我军战术互联网进行的一种探索性研究,研究成果可望应用到我军连排战术网络组建中,可以为我军战术互联网的实现和性能评估提供仿真支持,为战术互联网的设计和规划提供参考。
Tactical Internet (TI), base on Ad Hoc technology, is an acentric, self-organized and multi-hop wireless network. TI can be rapidly deployed without any pre-existing network infrastructure or centralized administration. Moreover, it is destruction-proof. Undoubtedly, it is of great value in military communications. However, while the foreign military forces were commonly equipped with TI, our PLA has not made full use of it due to some technical difficulties. This thesis puts forward a new network structure for TI after analyzing the components and the interconnection of the Tactical Internet. Also, a distributed-centralized key management is proposed. All the simulations, especially what impact the network structure’s variation exerts on the performance, were finished in OPNET. The research provides technological support for our TI construction and evaluation, guarantees TI’s stability in the digital battlefield and eventually helps us win.
     The content of this thesis is listed below:
     (1) On the base of introducing the general knowledge and main technology of TI,Key explains the technology of TI’s network structure and key management, unifies new Research results and army’s actual. Made it clear that the first thing is to mange network structure and the key well.
     (2) After inspecting the foreign mature TI, suggested developing our own TI in a multilayer and multilevel way, which not only guarantees small union, even individual’s communication with little network resource, but also the inter-layer and cross-level one.
     (3) In network secrity, according as multilayer-multilevel network structure put forward a distributed-centralized key management. The security request of TI is up to the request.
     (4) Established two TI nodes models and simulated them in various scopes, velocities and loads. Such experiments simulate those that influence TI's performances as the node's amount and movement speed, loads in the network and so on. Some data and diagrams including Delay, Media Access Delay, Load, ETE Delay, Throughout, Overhead and bit error rate are received.
     The paper explores an approach to study TI. The conclusions can be applied to platoon network or company network in PLA, and can provide simulative technological support for implementation and performanceestimate of the TI. And people may also refer to the results of this dissertation to plan and design the TI.
引文
[1] 王海涛,郑少仁. Ad Hoc 网络技术. 人民邮电出版社, 2005 年
    [2] 于宏毅. 无线移动自组织网. 人民邮电出版社, 2005 年
    [3] 卢勇. GSM/GPRS/WCDMA 无缝网络和共享网络. 电信技术. 2002(5).52-53
    [4] Ricardo S, Joseph E. Gart M. Networking on the battlefield: challenges in highly dynamic multi-hop wireless network [C] MILCOM 1999. Atlantic City, New Jersey: IEEE Inc, 1999. 751-755.
    [5] Gerla M, Tsai J T C. Multi-cluster, mobile, multimedia radio network [J]. Wireless Networks, 1995, 1 (3): 255-265
    [6] 秦宜学 数字化战场 国防工业出版社 2004 年
    [7] 张冬青,王蕾. 从伊拉克战争看信息化战争及信息战. 航天电子对抗. 2005 年
    [8] 冯忠国,赵小松. 美军网络中心战. 国防大学出版社. 2004
    [9] Lee S J, Su W, Gerla M. Ad hoc wireless multicast with mobility predication [A]. Proceeding of IEEE ICCCN 99[C]. Boston: IEEE Inc, 1999. 4-9
    [10] D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[C]. Proceedings of the IEEE Workshop on Mobile Computing Systems. 1994,(12):158-163.
    [11] 齐艳平,葛强,赵宏娜. 无线网络技术与军事战术互联网. 无线电通信技术.2002. 28
    [12] 方旭明. 移动 ad hoc 网络研究现状与发展. 数据通信.2003(4)
    [13] 谢希仁. 计算机网络(第 4 版). 大连理工大学出版社 北京.2004 年
    [14] Lakshminarayanan Subramanian, Randy H Katz.An Architecture for Building Self-Configurable Systems. IEEE/ACM Workshop on Mobile Ad Hoc Network andComputing. Boston, August 2000
    [15] Bowman R D, Baum C W. A multicasting protocol using transmitter directed frequency hop signaling for multi-hop wireless networks[C]. M ILCOM 2000. Los Angeles, California: IEEE Inc, 2000. 539-543
    [16] 王海涛,宋丽华. 一种军用自组织网络体系结构的设计. 通信世界. 2003(2): 41
    [17] 韩卫占. 战术通信网网络管理技术研究. 无线电通信技术. 1999. 25(2):1999-2003
    [18] Yoon C.J. Chan C Chiu. MIL-STD-188-220A parameter optimization for Tactical Internet. Proceedings-IEEE Military Communications Conference MILCOM, v3:960-965,1998
    [19] A Misra, S Das. Autoconfiguration registration and mobility management for Pervasivecomputing. IEEE Personal Communication System Magazines. 2001(4).24-31
    [20] 戴逸民,王培康,陈巍. 通信网的安全理论与技术. 清华大学出版社. 2006 年
    [21] 郑相全等. 无线自组网技术实用教程. 清华大学出版社. 2004 年
    [22] Yang Hao, Meng Xiaoqiao, Lu Songwu. Self-organized network-layer security in mobile ad hoc networks. Proceedings of the Workshop on Wireless Security. Atlanta, GA, United States.2002. Atlanta, GA .15-19
    [23] Ram R, Martha S. Hierarchically-organized, multi-hop mobile wireless networks for quality of service support [J].Mobile Networks and Applications, 1998, 3 (1): 101-109.
    [24] 张军,李见任,马建国. IT 战争. 北京.科学出版社. 2000
    [25] 陈敏. OPNET 网络仿真. 清华大学出版社,2004 年
    [26] 孙屹,孟晨. OPNET 通信仿真开发手册. 国防工业出版社. 2005 年
    [27] 张剑,刘伟. 军用无线网络仿真. 军事通信技术. 2002. 23(2): 35-41
    [28] 吴崇善. WLAN 的军事应用. 当代通信. 2003(15):17-22
    [29] Chang Xinjie. Network simulations with OPNET Winter Simulation Conference Proceedings, v1 Phoenix, AZ, USA. 1999, 307-316
    [30] 王文博,张金文. OPNET Modeler 与网络仿真. 北京:人民邮电出版社, 2003 年
    [31] 伍俊洪,杨洋,李惠杰,林孝康. 网络仿真方法和 opnet 仿真技术. 计算机工程.2004.30(5):106-108
    [32] 陈敏,张金文,韦岗. OPNET 无线信道建模. 计算机工程与应用. 2003(25):66-70
    [33] Lin CR, Gerla M. Adaptive clustering for mobile wireless network [J]. IEEE Journal on Selected Areas in Communication, 1997, 15 (7): 1265-1275
    [34] Lichun B, Garcia Luna Aceves J J. Collision free topology-dependent channel access scheduling[C]. M ILCOM 2000. Los Angeles, California: IEEE Inc, 2000. 507-511
    [35] 顾伟著. 军事科技与新军事变革. 复旦大学出版社. 2004 年

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700