期刊文献+

基于身份加密的Ad hoc网络安全模式

Ad hoc Network Security Schema of Identity-based Encryption
下载PDF
导出
摘要 无线Adhoc网络由一些没有中心管理机构的结点组成,由网络中的所有结点共同担负职责.由于Adhoc网络比传统的无线网络更加容易受到攻击,提出两个有效的安全模式用于Adhoc网络,结点通过使用非交互性计算对称密钥,减少通讯开销,并允许结点为不同的组生成它们的广播密钥,提出一种无碰撞方法计算这些密钥,最后介绍一种基于对称密钥体制的认证广播模式和相应的数字签名模式. Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. This paper presents two efficient security schemes for these networks that use pairwise symmetric keys computed non - interactively by the nodes which reduces communication overhead. Nodes are allowed to generate their broadcast keys for different groups and propose a collisionfree method for computing such keys. The paper also introduces an authenticated broadcast scheme based on symmetric keys and a corresponding signature scheme.
作者 周慧华
出处 《湖北民族学院学报(自然科学版)》 CAS 2005年第3期262-265,共4页 Journal of Hubei Minzu University(Natural Science Edition)
关键词 AD HOC网络 安全 基于身份加密 认证广播模式 Ad hoc network security identity - based encryption authenticated broadcast schemes
  • 相关文献

参考文献9

  • 1Khalili A ,Katz J,Arbaugh W A.Toward secure key distribution in truly ad hoc networks[A].in: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet[C].Orlando,FL,January,28, 2003.
  • 2Dahill B,Levine B,Royer E,et al.A secure routing protocol for ad hoc networks[R].Technical report UM-CS-2001-037, University of Massachusetts, August,2001.
  • 3Hu Y -C,Perrig A,Johnson D B.SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks[A].in: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications[C].June,2002.
  • 4Hu Y -C,Perrig A,Johnson D B.Ariadne:a secure on demand routing protocol for ad hoc networks[A]. in:Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom'02)[C].September,2002.
  • 5Sakai R,hgishi K, Kasahara M.Cryptosystems based on pairing[A].in: Proceedings of the 2000 Symposium on Cryptography and Information Security[C].Okinawa, Japan, January,2000.
  • 6Shamir A.Identity based cryptosystems and signature schemes[A].in: Advances in Cryptology-Crypto'84, Lecture Notes in Computer Science[C].Springer,Berlin,1984,196:47~53.
  • 7Boneh D,Franklin M.Identity-based encryption from the Weil pairing,extended abstract[A].in:Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science[C].Springer,Berlin,2001,2139:229~231.
  • 8Menezes A J.Elliptic curve public key cryptosystems[M].Kluwer Academic Publishers, Dordrecht,1993.
  • 9Cha J C,Cheon J H.An identity-based signature from gap diffie-hellman groups[A].in:Proceedings of the international workshop on practice and theory in public key cryptography[C].January,2003.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部