期刊文献+

一种适用于Ad hoc网络的轻量级密钥交换协议 被引量:1

Lightweighted key exchange protocol in Ad hoc networks
下载PDF
导出
摘要 通过对Ad hoc网络安全性特殊需求的分析,提出适合其特点的轻量级节点间密钥交换协议.协议使用一种新的基于ID的身份认证机制相互验证身份;使用改进的Blom机制生成加密密钥和认证密钥,分别用于数据私密性保护和报文完整性检查.为了防止敌方捕获密钥,提出基于节点间数据流的密钥更新机制.针对节点撤销,给予相应的解决方案.从不同的角度对协议进行安全性分析,通过和其他实现方法比较,在性能方面证明其高效性. Through the analyses of special security requirements in Ad hoc networks,a lightweighted key exchange protocol between two nodes is proposed in this paper.In order to validate its identity,a new authentication mechanism based on ID is used in this protocol.Two keys of which one is used for privacy and the other is used for integrality are genetrated by improved Blom mechanism.A key updating measure based on the data flow between nodes is used to prevent enemy capture keys.Aiming at nodes withdrawal,the authors propose the corresponding solution.From different angles,they analyze the security of protocol.By comparison of other methods,the high efficiency of this protocol is validated.
作者 李之棠 王喆
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2005年第z1期200-204,共5页 Journal of Dalian University of Technology
基金 国家网络与信息安全保障持续发展计划资助项目(2004研1-917-021) 武汉市科学技术局资助项目 华中科技大学天华网络信息安全研究所支持项目
关键词 AD HOC网络 身份认证 加密密钥 验证密钥 节点撤销 Ad hoc network identity authentication encrypting key validation key nodes withdrawal
  • 相关文献

参考文献7

  • 1[1]PERRING A, SZEWCZYK R, WEN V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002, 8:521-534.
  • 2[2]JAMSHAID K, SCHWIEDERT L. SEKEN (Secure and efficient key exchange for sensor networks)[J]. 23rd IEEE International Performance, Computing, and Communications Conference (IPCCC), 2004, 4:415-422.
  • 3蒋毅,史浩山.一种新的移动Ad hoc网络的安全路由策略[J].微电子学与计算机,2005,22(4):30-32. 被引量:4
  • 4[4]DU W, DENG J, HAN Y S, et al. A pairwise key predistribution scheme for wireless sensor networks[J]. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), 2003, 10:42-51.
  • 5[5]GUNTHER C G. An identity-based key-exchange protocol[J]. Advances in Cryptology, EUROCRYPT, 1989 LNCS, 434:29-37.
  • 6[6]KHALILI A, KATZ J, ARBAUTH W A. Toward secure key distribution in truly ad-hoc networks[A]. SAINT 03 Works', 2003 Symposium on applications and the Internet Workshops[C]. [S.l.]: IEEE C S Press, 2003,3:342-346.
  • 7[7]CHAN H, PERRING A, SONG D. Random key predistribution schemes for sensor networks[J]. IEEE Symposium on Security and Privacy. Berkeley, 2003, 5:197-213.

二级参考文献5

  • 1Keng Seng Ng, Seah, W K G. Routing Security and Data Confidentiality for Mobile Ad hoc Networks. Vehicular Technology Conference, 2003. VTC 2003-Spring. The 57th IEEE Semiannual, 2003, 3(3):1821~1825.
  • 2Wenjing Lou, Yuguang Fang. A Multipath Routing Approach for Secure Data Delivery, Military Communications Conference, 2001.MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force.IEEE, 2001, 2(2): 1467~1473.
  • 3Lidong Zhou, Haas Z J. Securing Ad hoc Networks. IEEE Network, 1999, 13(6): 24~30.
  • 4周海刚,肖军模.Ad hoc网络安全模型的研究[J].解放军理工大学学报(自然科学版),2002,3(3):5-8. 被引量:10
  • 5杜欣军,葛建华,王莹.一种增强AODV路由协议安全性的方案[J].西安电子科技大学学报,2002,29(6):819-821. 被引量:9

共引文献3

同被引文献6

  • 1Lidong Zhou, Zygmunt J Haas. Securing ad hoc networks. IEEE Networks Special Issue on Network Security, 1999, 13 (6): 24 -30.
  • 2Burrows M, Abadi M, Needham R. A logic of authentication.”Proceedings of the Royal Society of London A, Vol426. 1989. 233-271.
  • 3Needham R, Schroeder M. Using eneryption for authentication in large networks of computers.”Communications of the ACM, 1978, 21(12): 993 - 999
  • 4Otway D, Rees O. Efficient and timely mutual authentication.Operating Systems Review, 1987, 21(1):8-10.
  • 5Shamir A. "How to share a secret." Communications of the ACM, 1979, 22(11):612-613.
  • 6任勇军,王建东,庄毅,方黎明.基于身份的Ad Hoc网络门限密钥发送协议[J].武汉大学学报(工学版),2007,40(5):133-136. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部