期刊文献+

一种有效的Ad hoc网络组密钥更新方案

Efficient Group Rekeying Scheme for Ad hoc Networks
下载PDF
导出
摘要 文章在讨论了一般动态Ad hoc网络密钥管理方案的基础上,针对密钥管理中较为难以有效实现的组密钥更新问题提出了一种有效的组密钥更新方案。 In this paper, we propose an efficient group rekeying scheme for dynamic Ad hoc networks based on analyzing general key managements of Ad hoc networks, in which the group rekeying problem is known as an open difficult problem.
出处 《信息工程大学学报》 2007年第2期147-150,共4页 Journal of Information Engineering University
基金 国家863计划资助项目(2005AA147040)
关键词 AD HOC网络 密钥管理 组密钥更新 Ad hoc networks key managements group rekeying
  • 相关文献

参考文献16

  • 1Perkins CE. Ad Hoe Networking[ M]. London: Addison- Wesley, 2001.
  • 2Zhou LD, Hass ZJ. Securing in ad-hoc networks [ J]. IEEE Networks, 1999,13 (6) :24 - 30.
  • 3Stajano F, Anderson R. The resurrecting duckling: Security issues for ad - hoc wireless networks [ C ]//Proc. of the 7th Int'l Workshop on Security Protocols. Berlin: Spfingler-Verlag, 1999:56 - 59
  • 4Griffin S, DeCleene B, Dondeti L, Flynn R, Kiwior D, Olbert A. Hierarchical key management for mobile multicast members [ R ]. Technical Report, Northrop Grumman Information Technology, 2002.
  • 5Basagni S, Herrin K, Bruschi D, Rosti E. Secure pebblenets[C]//Proc, of the 2001 ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing. New York: ACM Press, 2001:156 - 163.
  • 6Hardjono T, Tsudik G. IP Muhicast security: Issues and directions [ J ]. Julho-Agosto: Annales de Telecom, 2000 : 324 - 334.
  • 7Moyer MJ, Rao JR, Rohatgi P. A survey of security issues in multicast communications [ J ]. IEEE Network Magazine, 1999,13(1): 12-23.
  • 8Wallner D, Harder E, Agee R. Key Management for Muhicast: Issues and Architectures. Request for Comments (Informational) 2627, Internet Engineering Task Force [ EB/OL ]. ( 1990-10-15 ). http ://www. faqs. org/ rfcs/rfc2627, html.
  • 9况晓辉,张念,胡华平.移动自组网络环境下组密钥管理协议性能分析[J].计算机工程与科学,2004,26(3):4-7. 被引量:4
  • 10Hietalahti M. Efficient key agreement for ad-hoc networks [ R]. Espoo: Department of Computer Science and Engineering, Helsinki University of Technology, 2001.

二级参考文献12

  • 1[1]Y Amir. On the Performance of Group Key Agreement Protocols[A].IEEE ICDCS 2002[C]. 2002.463-464.
  • 2[2]D W Carman, P S Kruus, B J Matt. Constraints and Approaches for Distributed Sensor Network Security[R]. Technical Report 00-010, NAI Labs, 2000.
  • 3[3]H Harney, C Muckenhirm. Group Key Management Protocol(CKD) Architecture[S]. RFC 2093, 1997.
  • 4[4]Y Amir, G Ateniese, D Hasse, et al. Secure Group Communication inAsynchronous Networks with Failures: Integration and Experiments[A]. IEEE ICDCS 2000[C]. 2000.330-343.
  • 5[5]Michael Steiner, Gene Tsudik, Michael Waidner. Diffle-Hellman Key Distribution Extended to Group Communication[A]. 3rd ACM Conf on Computer and Communications Security[C]. 1996.31-37.
  • 6[6]Y Kim, A Perrig, G Tsudik. Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups[A]. Proc of 7th ACM Conf on Computer and Communications Security[C]. 2000.235-244.
  • 7[7]Klaus Becker, Uta Wille. Communication Complexity of Group Key Distribution[A]. Proc 5th ACM Conf on Computer and Communication Security[C].1998.1-6.
  • 8[8]M Burmester, Y Desmedt. A Secure and Efficient Conference Key Distribution System[A]. Advances in Cryptology-EUROCRYPT'94[C]. 1994.275-286.
  • 9[9]W Diffie, M E Hellman. New Directions in Cryptography[J]. IEEE Trans onInformation Theory, 1996,22(6):644-654.
  • 10[10]NS-2(The Network Simulator)[EB/OL]. http://www.isi.edu/nsnam/ns/,1999-04.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部