期刊文献+

移动AD-HOC网络中的高效认证方案

Efficient Authentication Schemes for Mobile AD HOC Networks
下载PDF
导出
摘要 由于诸多物理限制,在移动AD-HOC网络中实现节点认证存在许多困难。自发组网形式排除了采用单钥体制的可能,因为并不存在TTP或统一的管理机构。基于PKI的认证方法提供了较好的灵活性和安全性,但计算量较大,CA服务器也易于成为网络瓶颈和攻击目标。为此,利用门限秘密共享技术将CA功能分布到各网络节点上,消除了对CA服务器的过分依赖。根据漫游区域的连续性,采用门限体制对公钥认证进行优化,进一步减少了认证通信量和计算量,同时引入积分机制保障节点间的协作关系。 Due to a good many physical constrains, entity authentication is not a trivial task in wireless AD HOC networks. Self-organized networking precludes adopting symmetric cryptology for the purpose, because there are no TTPs or infrastructures available. Although PKI-based authentication provides better flexibility and security, the computation load is much heavier, also CA servers will become network bottlenecks and attacking targets. Using threshold secret sharing technique, Lidong Zhou et al. proposed the first scheme in which CA function is distributed over network nodes, thus the dependence upon CA servers is eliminated. In this paper, a further optimized scheme is proposed according to the continuity of roaming area and threshold secret sharing. The communication and computation overhead is further reduced remarkably and, tick mechanism is introduced for ensuring the cooperation between nodes.
出处 《杭州电子科技大学学报(自然科学版)》 2005年第3期47-51,共5页 Journal of Hangzhou Dianzi University:Natural Sciences
基金 国防重点实验室基金项目(No.51434060103DZ01)
关键词 自组织网络 网络安全 实体认证 self-organized network network security entity authentication
  • 相关文献

参考文献11

  • 1Abdul-Rahman Alfarez, Halles Stephen. A Distributed Trust Model[C]. In Proc. Of New Security Paradigms Workshop, ACM, New York, NY, USA, 1998.
  • 2Matt Blaze, Joan Feigenbaum, Jack Lacy. Decentralized trust management[C]. In Proc. 1996 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, pages 1996.164-173.
  • 3S Gar-nkel. PGP: Pretty Good Privacy[R]. O'Reilly & Associates Inc., Sebastopol, California, USA, 1995.
  • 4A Abdul-Rahman. The PGP Trust Model. EDI-Forum: the Journal of Electronic Commerce, Available at[EB/OL]. http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/ ,2004-08-08.
  • 5Hubaux L Buttyan, S Capkun. The quest for security in mobile ad hoc networks[C]. In Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001),2001.146-155.
  • 6S Capkun, L Buttyan,J-P Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks[J]. IEEE Transactions on Mobile Computing,2003,2(1):52-64.
  • 7L Zhou,Z J Haas. Securing ad hoc networks[J]. IEEE Network Magazine,1999,13(6):24-30.
  • 8J Kong, P Zerfos, H Luo,etal. Providing robust and ubiquitous security support for mobile ad-hoc networks[C]. in International Conference on Network Protocols (ICNP), 2001.251-260.
  • 9Haiyun Luo, Songwu Lu. Ubiquitous and robust authentication services for ad hoc wireless networks[R]. UCLA Computer Science Technical Report 200030,2000.
  • 10L Butty.J-P Hubaux. Nuglets a virtual currency to stimulate cooperation in self-organized ad hoc networks[R]. Technical Report DSC/2001/001, Swiss Federal Institute of Technology - Lausanne, 2001.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部