期刊文献+

Adhoc网络密钥生成管理方案综述与分析 被引量:3

Analytical Overview of Key Establishment and Management for Ad hoc Networks
下载PDF
导出
摘要 Adhoc网络安全性是迅速发展的一个研究热点,提出高效适用的密钥生成管理方案是其中的难点,目前对此已有的成果纷繁多样。分类总结了这方面的理论,对比和分析了各种方法的功能,并指出了各自存在的问题,总结出密钥生成和管理协议存在的共性问题,为进一步的工作提供了清晰的思路。 Ad hoc networks is a new wireless networking paradigm for mobile hosts.So far, research on mobile Ad hoc networks has been focused primarily on routing issues.The study on the security in Ad hoc networks is a rapidly developing area,and protocols for key establishment and management are the special hard work.The paper presents a general overview of existing representative theories through analyzing their goodness and weakness.
机构地区 山东省计算中心
出处 《计算机应用研究》 CSCD 北大核心 2004年第10期9-11,21,共4页 Application Research of Computers
基金 山东省自然科学基金资助项目(Y2002G10)
关键词 AD HOC网络 密钥管理 证书认证 Ad hoc Networks Key Management Certification
  • 相关文献

参考文献15

  • 1J P Hubaux,T Gross,et al.Toward Self-organized Mobile Ad hoc Networks:The Terminodes Project[J].IEEE Communications Magazine,2001,(1).
  • 2Lidong Zhou,Zygmunt J Haas.Securing Ad hoc Networks[J].IEEE Networks,1996,13(6).
  • 3Silja Marki,Tuoma Aura,Maarit Hietalahti.Robust Membership Ma-nagement for Ad hoc Groups[Z].
  • 4H Luo,S Lu.Ubiquitous and Robust Authentication Service for Ad hoc Wireless Network[R].Technical Report 200030,UCLA Computer Science Department,2000.
  • 5J Kong, P Zerfos,et al.Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks[J].IEEE ICNP,2001.
  • 6H Luo,et al.Self- securing Ad hoc Wireless Networks[J].IEEE ISCC,2002.
  • 7J P Hubaux,L Buttyan,S Capkun.The Quest for Security in Mobile Ad hoc Networks[J].ACM,2001.
  • 8A Menezes,P Van Orschoc,et al.Handbook of Applied Cryptography[M].CRC-Press,1997.
  • 9L Blazevic,L Buttyan,S Capkun,et al.Self-organized in Mobile Ad hoc Networks:The Approach of Terminodes[J].IEEE Communication Magazine,2001,(6).
  • 10Srdjan Capkun,Levente Buttyan,et al.Self-organized Public Key Management for Mobile Ad hoc Networks[Z].2002.

二级参考文献7

  • 1Stajano F, Anderson R. The resurrecting duckling: security issues for ad-hoc wireless networks. In: Proceedings of 7t h International Workshop on Security Protocols, Cambridge, UK, 1999
  • 2Difiie W, Hellman M. New directions in cryptography. IEEE Tnmsactions on Information Theory, 1976,22(6) :644~ 654
  • 3Steiner M, Tsudik G, Waidner M. Diffie-hellman key distribution extended to group communication. In: 3rd ACM Conference on Computer and Communications Security, 1996
  • 4Zhou L ,Zygmunt J H. Securing Ad Hoc networks. IEEE Network, 1999,13(6) :24- 30
  • 5Shamir A. How to share a secret. Commun ACM, 1979,22:612 - 613
  • 6臧婉瑜,于勐,谢立.单向ad-hoc移动网络路由协议UAOR[J].计算机学报,2001,24(10):1018-1025. 被引量:10
  • 7臧婉瑜,于勐,谢立,孙钟秀.按需式ad hoc移动网络路由协议的研究进展[J].计算机学报,2002,25(10):1009-1017. 被引量:39

共引文献16

同被引文献18

  • 1许力,郑宝玉,吴子文.移动自组网中节能路由策略的分析与比较[J].计算机应用研究,2004,21(5):1-4. 被引量:7
  • 2ZHOU L, HAAS Z J. Securing Ad hoc networks [J]. IEEE Network, 1999, 13(6):24-30.
  • 3SHAMIR A. How to share a secret[J]. ACM Comm, 1979, 22 (11) :612-613.
  • 4BECHLER M, HOF H, KRAFT D, et al. A clutter-based security architecture for Ad hoe networks [ C ] //Proc of the 23 rd Annual Joint Conference of the IEEE Computer and Communications Society. Hong Kong: [ s. n. ] ,2004.
  • 5HUBAUX J, BUTTYAN L, CAPKUN S. The quest for security in mobile Ad hoc networks[ C] //Proc of the 2nd ACM Symp on Mobile Ad hoc Networking and Computing. New York: ACM Press, 2001: 146-155.
  • 6CHANDRA J, SINGH L L. A cluster based security model for mobile Ad hoc networks [ C ] //Proc of Personal IEEE International Conference on Wireless Communications. 2005:413-416.
  • 7PERLMAN R. An overview of PKI trust models [ J]. Network, IEEE, 1999,13(6) :38-43.
  • 8ZHOU L, HAAS Z J. Securing Ad hoc networks [J]. IEEE Network Journal, 1999, 13(6) :24-30.
  • 9YI S, KRAVETS R. MOCA: mobile certificate authority for wireless Ad hoc networks[ C] //Proc of the 2nd Annual PKI Research Workshop (PKI2003). 2003:28-29.
  • 10KONG J, ZERFOS P, LUO H, et al. Providing robust and ubiquitous security support for mobile Ad hoc networks[ C] //Proc of the 9th International Conference on Network Protocols (ICNP). 2001:251-260.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部