期刊文献+

Ad-hoc网络动态密钥管理 被引量:2

Dynamic key management in adhoc networks
下载PDF
导出
摘要 阐述了当前ad hoc网络中有关认证和密钥管理的研究概况,特别论述了SecurePebblenets方法中密钥管理节点的生成,对节点加入和退出处理进行更详细分析,并补充了节点变化对簇的影响,对于ad hoc网络密钥管理的研究具有一定参考价值。 The paper expatiates the study of identification and key management in adhoc network. It especially discussed the form of key management node in Secure Pebblenets method and particularly analyzed how to join and exit nodes from adhoc network. It supplemented the effect to cluster when the nodes are chan-(ging).All these are useful to the study of key management in adhoc network.
作者 陆军 丁雪梅
出处 《信息技术》 2004年第7期76-78,共3页 Information Technology
关键词 AD_HOC 网络安全 密钥管理 adhoc network security key management
  • 相关文献

参考文献6

  • 1[1]Zhou L, Haas Z J. Securing Ad _ Hoc Networks [ J ]. IEEE Networks,1999,13(6).
  • 2[2]Luo H. Lu S. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[R]. Technical Report 200030, UCLA Computer Science Department 2000.
  • 3[3]Hubaux J - P, Buttyán L. Capkun S. The Quest for Security in Mobile Ad _Hoc Net - works[R]. ACM 2001.
  • 4[4]Balfanz D, Smetters D K, Stewart P, et al. Talking to Strangers: Authen- tication in Ad _Hoc Wireless Networks[R]. Intemet Society,Conference Proceeding of NDSS Conference 2002.
  • 5[5]Asokan N, Ginzborg P. Key Agreement in Ad _Hoc Networks[J].Computer Communi - cations 2000,23.
  • 6[6]Basagni S, Herrin K, Rosti E, et al. Secure Pebblenets[R]. ACM 2001.

同被引文献24

  • 1朱晓妍,伍前红,王育民.移动Ad hoc网络安全策略[J].网络安全技术与应用,2004(1):22-25. 被引量:6
  • 2叶阿勇,许力.移动Ad Hoc网络安全策略研究[J].微计算机应用,2004,25(4):385-390. 被引量:5
  • 3许力,张继东,郑宝玉,杨震.移动自组网能量保护策略研究进展[J].通信学报,2004,25(9):93-103. 被引量:16
  • 4RAMANATHAN R,REDI J.A Brief Overview of Ad Hoc Networks:Challenges and Directions[J].IEEE Communication Magazine,2002,23 (5):48-53.
  • 5ZHOU L,HAAS ZJ.Securing Ad Hoc Networks[J].IEEE Networks,1999,13(6).
  • 6HARNEY H, MUCKENHIRN C.Group key management protocol(GKMP) specification.RFC2093[S]. 1997.
  • 7HARNEY H, MUCKENHIRN C.Group key management protocol(GKMP) architecture. RFC2094[S]. 1997.
  • 8WALLNER D, HARDER E, AGEE R.Key management for multicast: Issues and architec-tures. RFC 2627[S]. 1999.
  • 9WALDVOGEL M, GARONNI G, SUN D,et al.The VersaKey framework: Versatile group key management[J]. IEEE Journal on Selected Areas in Communications(Special Issue on Middleware), 1999,17(9):1614-1631.
  • 10BALENSON D, MCGREW D, SHERMAN A.Key management for large dynamic groups: One-Way function trees and amortized initialization[Z]. IETF Internet Draft (work in progress), 2000.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部