期刊文献+

双重认证Ad hoc网络安全路由协议设计 被引量:1

Design of two-tier authentication secure Ad hoc routing protocol
下载PDF
导出
摘要 由于Ad hoc网络拓扑的动态性和数据传输的多跳性,传统路由协议不能保证Ad hoc网络路由安全。提出一种双重认证Ad hoc网络安全多径路由协议——TASRP(Two-tier Authentication Secure Multi-path Ad hoc Routing Protocol),在按需路由建立的过程中,引入了双重认证(邻节点之间的身份认证、中间节点处理路由请求包时的相互认证)机制,同时实现了一次性会话密钥的交换,既保证了节点分离路径的安全建立,又实现了端到端的数据安全传输,保证了整个网络运行的安全。最后运用BAN逻辑进行推理分析,分析表明,该路由协议具有高的安全性。 Because of dynamic topology and the multi-hop of data transmission in Ad hoc networks,traditional routing protocol can't ensure the routing security of Ad hoc networks.In this paper,a two-tier authentication security Ad hoc network routing protocol-TASRP (Two-tier Authentication Secure Ad hoc Routing Protocol) is proposed.In the process of establishment of on- demanding routing,introducing a two-tier authentication (identity authentication of neighbor nodes and mutual authentication while intermediate nodes processing the routing request packets) and exchanging one-time session key,it ensures the secure establish- ment of node-disjoint route,and it realizes the security of data transfers from end to end,ensuring the secure running of whole network.At the end of this paper,the security of the protocol is reasoned and analyzed by BAN logic,the analysis shows that the routing protocol has high security.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第8期93-96,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)No.2007AA01Z438200~~
关键词 Ad HOC网络 安全路由协议 认证 密钥交换 BAN逻辑 Ad hoc network security routing protocol authentication key exchange BAN logic
  • 相关文献

参考文献12

  • 1李之棠,郭伟.一种双向认证Ad hoc安全路由协议的研究[J].小型微型计算机系统,2005,26(9):1507-1509. 被引量:1
  • 2Papadimitratos P,Haas Z.Seeure routing for mobile ad hoe networks[C]//Proc of the CNDS' 02(TX,San Antonio), January 2002.
  • 3Sanzgiri K,Dahill B,Levine B.A secure routing protocol for Ad Hoc networks[C]//Proceedings of the IEEE 2002 International Conference on Network Protocols(ICNP),Nov 2002.
  • 4Mavropodi R,Kotzanikolaou P,Douligeris C.SecMR-a secure multipath routing protocol for ad hoc networks[J].Ad Hoc Networks,2007(5):87-99.
  • 5Liu Hong-jun,Luo Ping,Wang Dao-shun.A scalable authentication model based on public keys[J].Joumal of Network and Computer Applications, 2008,3 ( 3 ).
  • 6Giovanni Di Crescenzo.Secure node discovery in Ad-hoc networks and applications[J].Electronic Notes in Theoretical Computer Science, 2007,171:43-55.
  • 7Narula P,Dhurandher S K,Misra S.Security in mobile ad-hoe networks using soft encryption and trust-based multi-path routing[J]. Computer Communications,2008,31:760-769.
  • 8Pham P P,Perreau S.Performance analysis of reactive shortest path and multi-path routing mechanism with load balance[C]//IEEE INFOCOMM 2003.
  • 9Burrows M,Abadi M,Needham R.A logic of authentication [J]. ACM Trans on Computer Systems, 1990,8(1 ): 18-36.
  • 10王英龙,王继志,王美琴.基于BAN逻辑的ad hoc移动网络路由协议的安全性分析[J].通信学报,2005,26(4):125-129. 被引量:4

二级参考文献25

  • 1J Clark, J Jacob. A survey of authentication protocol literature,version 1.0. Department of Computer Science, University of York. http:∥fpl. cs. depaul. edu/ajeffrey/se547/papers/ClarkJacob1997 Survey Authentication, 1997-11
  • 2M Burrows, M Abadi, R Needham. A logic of authentication.ACM Trans on Computer Systems, 1990, 8(1): 18~36
  • 3M Burrows, M Abadi, R Needham. A logic of authentication.SRC, Digital Equipment Corporation, Tech Rep: 39, 1989
  • 4J McLean. Twenty years of formal methods. In: Proc of the IEEE Symp on Security and Privacy. Washington: IEEE Computer Society Press, 1999. 115~ 116
  • 5L Gong, R Needham, R Yahalom. Reasoning about belief in cryptographic protocols. The IEEE Symp on Research in Security and Privacy, Oakland, CA, 1990
  • 6W Mao, C Boyd. Towards a formal analysis of security protocols.In: Proc of the Computer Security Foundations Workshop Ⅵ.Washington: IEEE Computer Society Press, 1993. 147~158
  • 7M Abadi, M Tuttle. A semantics for a logic of authentication. In:Proc of the 10th ACM Symp on Principles of Distributed Computing. New York: ACM Press, 1991. 201~216
  • 8P C Oorschot. Extending cryptographic logics of belief to key agreement protocols (extended abstract ) . In: Proc of the 1st ACM Conf on Computer and Communications Security. New York, NY: ACM Press, 1993. 232~243
  • 9P F Syverson, P C Oorschot. On unifying some authentication protocol logic. In: IEEE Computer Society Symp on Research in Security and Privacy. Washington: IEEE Computer Society Press, 1994. 14~28
  • 10P F Syverson, P C Oorschot. A unified cryptographic protocol logic. http:∥citeseer. ist. psu. edu/syverson96unified. html,1996-12

共引文献71

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部