期刊文献+

基于身份的ad hoc组密钥管理方案 被引量:4

Identity-base group key management scheme in ad-hoc
下载PDF
导出
摘要 利用分层的密钥共享体制,提出了一种基于身份的分层的分布式ad hoc组密钥管理方案,避免了将系统密钥平等分发给每个节点,攻破任意K个节点即可更新组密钥的缺陷。并以网格作为逻辑结构,具有了高联通性、低负载、扩展性强的特点。经分析表明,该方案比传统方案更高效、更安全、抗攻击能力更强。 An identity-base group key management scheme in ad-hoc was proposed, which was based on distributing key management.In this scheme, nodes were divided into two parts, server nodes and ordinary nodes.The shares held by server nodes included more information than ordinary nodes.The scheme reducing the risk of distributing key shares to all nodes that compromising of any K node would leak the system's group key.The logical structure of the scheme was a grid.This scheme not only has the advantages of high connectivity and low overhand, but also has high expandability.It is analyzed that this scheme is more efficient, security and stronger anti-attack than traditional scheme.
出处 《通信学报》 EI CSCD 北大核心 2009年第S1期85-92,共8页 Journal on Communications
基金 "十一五"国家科技支撑计划项目资助(2006BAF01A21)~~
关键词 ad HOC网络 组密钥管理 WEIL配对 网格 ad hoc network group key management Weil pairing grid
  • 相关文献

参考文献11

二级参考文献36

  • 1殷卫红,殷脂.移动计算环境下异构数据快速同步模型的设计与研究[J].微计算机信息,2005,21(10X):179-181. 被引量:4
  • 2[13]F Stajano, R Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. The 7th Int'l Workshop on Security Protocols, LNCS 1796, Berlin: Springer, 2000. 172~194
  • 3[14]J Kong, P Zerfos, H Luo et al. Providing robust and ubiquitous security support for mobile ad-hoc networks. The 9th Int'l Conf on Network Protocols (ICNP'01), Riverside, CA, 2001
  • 4[1]R Canetti, J Garay, G Itkis et al. Multicast security: A taxonomy and efficient constructions. INFOCOM'99, New York, 1999
  • 5[2]T Hardjono, G Tsudik. IP multicast security: Issues and directions. 2000. http://www.securemulticast.org/smugpapers.htm
  • 6[3]M J Moyer, J R Rao, P Rohatgi. A survey of security issues in multicast communications. IEEE Network Magazine, 1999, 13(6): 12~23
  • 7[4]D Wallner, E Harder, R Agee. Key management for multicast: Issues and architectures. RFC 2627, Internet Engineering Task Force, 1999. http://www.rfc-archive.org
  • 8[5]Y Amir, G Ateniese, D Hasse et al. Secure group communication in asynchronous networks with failures: Integration and experiments. IEEE ICDCS 2000, Los Alamitos, CA: IEEE Computer Society Press, 2000. 330~343
  • 9[6]M Steiner, G Tsudik, M Waidner. Diffie-Hellman key distribution extended to group communication. The 3rd ACM Conf on Computer and Communications Security, New Delhi, India, 1996
  • 10[7]M Burmester, Y Desmedt. A secure and efficient conference key distribution system. In: Proc of Eurocrypt'94, LNCS 950, Berlin: Springer, 1995. 275~286

共引文献40

同被引文献20

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部