期刊文献+

用于Ad hoc网络的鉴别路由协议及性能分析 被引量:2

Authenticated routing for Ad hoc networks and performance analysis
下载PDF
导出
摘要 剖析了多跳Ad hoc网络AODV与DSR路由协议的安全漏洞,并指出安全路由协议的设计需求。本文详细介绍了一种Ad hoc的鉴别路由协议ARAN,该协议采用公钥密码技术,利用节点对路由消息的签名,有效地抵制了各种恶意攻击,虽然在某种程度上增加了计算复杂度,提高了节点存储量,但仍不失为一种有效的按需安全路由协议,可以满足无线多跳Ad hoc网络在各种应用领域对路由的安全需求。 Security threats against Ad hoe routing protocols were introduced in terms of AODV and DSR used as representatives of multi-hop Ad hoe on-demand protocols. In order to guard against these attacks, security requirements for Ad hoe routing design were described and an Authenticated Routing for Ad hoc Networks (ARAN) was detailed. This current protoeol exploited asymmetric cryptographic operations and its routing messages were signed by node's private key, so it successfully defeated many different types of identified attacks. Although ARAN has some disadvantages on computing complexity and memory size, it is a sufficient on-demand security routing protocol and can satisfy security muting requirements for various applications.
出处 《计算机应用》 CSCD 北大核心 2005年第9期2066-2069,2077,共5页 journal of Computer Applications
基金 国家自然科学基金和微软亚洲研究院联合资助项目(60372048) 教育部科学技术研究重点项目(104171)
关键词 路由安全 公钥体制 AD hoc鉴别路由协议 Ad hoc route security public key infrastructure authenticated muting for Ad hoe networks (ARAN)
  • 相关文献

参考文献9

  • 1PERKINS CE, BELDING-ROYER EM, DAS S. Ad hoc On-Demand Distance Vector (AODV) Routing[ EB/OL]. http:∥moment. cs.ucsb. edu/pub/draft-perkins-manet-aodvbis-00. txt. Mobile Ad Hoc Networking Working Group INTERNET DRAFT, 19 October 2003.
  • 2JOHNSON D. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) [ EB/OL]. http:∥www. ietf. org/internetdrafts/draft-ietf-manet-dsr-09. txt, April 2003.
  • 3Manel Guerrero . Secure Ad hoc on - demand distance vector (SAODV) routing[ EB/OL]. http:∥moment. cs. ucsb. edu/pub/draft-guerrero-manet-saodv-00. txt, August 2001.
  • 4DAHILL B, SANZGIRI K, LEVINE BN, et al. A Secure Routing Protocol for Ad Hoc Networks [A]. Proceeding of 10th IEEE International Conference on Network Protocols ( ICNP 2002) [C], 2002.78 - 87.
  • 5SANZGIRI K, DAHILL B, et al. A Secure Routing Protocol for Ad Hoc Networks [A]. Proceedings of the 10th IEEE International Conference on Network Protocols ( ICNP 2002) [C], 2002.97 - 105.
  • 6PAPADIMITRATOS P, HAAS ZJ. Secure Routing for Mobile Ad hoc Networks [A]. Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference ( CNDS 2002) [J], 2002. 43 -51.
  • 7IEEE Std 802. 11i. Medium Access Control (MAC) Security Enhancement[S], June 2004.
  • 8GB15629.11-2003.信息技术·系统间远程通信和信息交换·局域网和城域网·特定要求·第11部分:无线局域网媒体访问控制和物理层规范[S].[S].,2003..
  • 9铁满霞,吴靖,唐厚俭,李建东.宽带无线IP系统移动终端的安全接入技术[J].小型微型计算机系统,2003,24(12):2075-2078. 被引量:3

二级参考文献1

共引文献2

同被引文献15

  • 1铁满霞,黄振海,张变玲,庞辽军.WAPI证书鉴别与密钥管理协议[J].移动通信,2006,30(5):37-41. 被引量:3
  • 2Standard ISO/IEC.Information technology open systems intercon-nection evaluation criteria for information technology[S].1999.
  • 3Trusted Computing Group.Trust platform module main specifica- tion version 1.2[S].2005.
  • 4Sailer R,Zhang X, Jaeger T,et al.Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of the 13th Usenix Security Symposium.California: Usenix, 2004: 223-238.
  • 5Trusted network connect architecture for interoperability r4[EB/OL]. (2005).http://www.trusted computing group.org/tnc/.
  • 6Trusted Computing Group.TCG TPM specification part 1 de- sign principles[S].USA:Trusted Computing Group,2006: 16-26.
  • 7Trusted Computing Group.Open standards for integrity-based net- work access control[S].2005.
  • 8Sanzgiri K, LaFlamme D, Dahill B, et al.Authenticated routing for Ad Hoc networks[J].IEEE Journal on Selected Areas in Communications, 2005,23 (3) : 598-610.
  • 9ZAPATA MG.Secure ad hoc on-demand distance vector (SAODV)routing[EB/OL].http://ietfreport.isoc.org/idref/draft-guerrero-manetsaodv/,2005-12-10.
  • 10JOHNSON DB,MALTZ DA,HU YC,et al.The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks(DSR)[EB/OL].http://www.ietf.cnri.reston.va.us/internet-drafts/draft-ietf-manet-dsr-09.txt,2003-04-15.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部