期刊文献+

Ad hoc网安全QoS按需路由协议研究 被引量:1

Securing QoS on-demand routing protocol for Ad hoc networks
下载PDF
导出
摘要 提出了对HORSE算法的改进算法HORSEI2.与HORSE相比,HORSEI2在不失去相同安全强度的前提下降低了签名验证的计算复杂性和签名传输的通信负荷.在此基础上,还提出了一个新的具备安全功能的Ad hoc网络满足多QoS约束的按需距离向量(AODV)路由协议SAODVQOS,它采用HORSEI2作为密码机制为路由报文签名.理论分析表明SAODVQOS协议机制为AODVQOS协议增加了源认证机制,从而为Ad hoc网络节点提供了来源真实性、数据完整性和抗否认等安全服务以抵御恶意节点的攻击.基于NS2的仿真结果表明SAODVQOS网络性能良好. An improved algorithm HORSEI2 was proposed based on HORSE.Compared with HORSE,HORSEI2 reduced the computational complexity of verifying a signature and the communication overhead caused by transmitting the signature without drop in security.After that,a novel secure quality of service for Ad hoc on-demand distance vector(AODV) routing protocol SAODVQOS was presented using HORSEI2 as cryptographic mechanism to sign the route massages.The analyses of theory on SAODVQOS indicate that the novel protocol enhance...
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第11期84-87,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60672137 60574088) 教育部博士学科点专项基金资助项目(20060497015)
关键词 安全 ADHOC网 服务质量 路由 协议 security Ad hoc networks QoS(quality of service) route protocol
  • 相关文献

参考文献6

  • 1[1]Hu Yih-Chun,Johnson D B.Securing Quality-ofService Route Discovery in On-Demand Routing for Ad hoc Networks,Conference on Computer and Communications Security[C] // Proceedings of the 2nd ACM workshop on Security of Ad hoc and sensor networks,Washington DC:ACM,2004:106-117.
  • 2[2]Papadimitratos P,Haas Z J.Secure route discovery for ireless Communication[C] // 2005 IEEE/Sarnoff Symposium,Advances in Wired and Wireless Communication.Princeton:IEEE,2005:176-179.
  • 3YANG Mingxi,LI Layuan,FANG Yiwei.Securing Multicast Route Discovery for Mobile Ad Hoc Networks[J].Wuhan University Journal of Natural Sciences,2007,12(1):189-192. 被引量:3
  • 4[4]Neumann W D.HORSE:an extension of an r-time signature scheme with fast signing and verification[C]//International Conference on Information Technology:Coding and Computing (ITCC'04).Las Vegas:NV,2004:5-7.
  • 5[5]Perkins C,Belding-Royer E.Quality of service for Ad-hoc On-demand distance vector routing[s/OL].http:// tools.ietf.org/id/draft-kettaf-manet-acor-02.txt[2007.3.30]
  • 6[6]Ronan de Renesse,Mona Ghassemian,Vasilis Friderikos,et al.QoS enabled routing in mobile Ad Hoc networks[C]//IEE 3G 2004,London:[s.n]2004.

二级参考文献8

  • 1Perrig A,Canetti R,Song D, et al.Efficient and Secure Source Authentication for Multicast[]./Network and Distributed System Security Symposium(NDSS ).2001
  • 2Zhu Yufang,Kunz T.MAODV Implementation for NS-2.26 (SCE-04-01[]..2004
  • 3Stallings W.Cryptography and Network Security Principles and Practice[]..2002
  • 4Neumann W D.HORSE: An Extension of an r-Time Signature Scheme with Fast Signing and Verification[]./ International Conference on Information Technology: Coding and Computing(ITCC’).2004
  • 5Luo Haiyun,Kong Jiejun,Zerfos P, et al.URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[].IEEE ACM Transactions on Networking.2004
  • 6Roy S,Addada V G,Setia S, et al.Securing MAODV: Attacks and Countermeasures, Sensor and Ad Hoc Communications and Networks[]./IEEE SECON : Second Annual IEEE Communications Society Conference.2005
  • 7Saxena N,Tsudik G,Yi J H.Access Control in Ad Hoc Groups[].International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-PP ).2004
  • 8Wei Dai.Crypto++ 5.2.1 Benchmarks [C/OL]. http://www.eskimo.com/~weidai/ . 2006

共引文献2

同被引文献4

  • 1Hu Y C, Perrig A. A Survey of Secure Wireless Ad Hoc Routing[J].IEEE Security & Privacy Magazine, 2004, 2(3): 28-39.
  • 2Hoffstein J, Graham N, Pipher J, et al. NTRUsign: Digital Signatures Using the NTRU Lattice[M]. [S. 1 .]: Springer-Verlag, 2003: 122-140.
  • 3Hoffstein J, Pipher J, Silverman J H. NTRU: A Ring Based Public Key Cryptosystem[M]. [S. 1.]: Springer-Verlag, 1998.
  • 41363 Working Group of the C/MM Committee. Draft Standard for Public-key Cryptographic Techniques Based on Hard Problems over Lattices[Z]. (2007-01-09). http://grouper.ieee.org/groups/1363/priv ate/P 1363.1-D9.doc.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部