期刊文献+

无线Ad Hoc网络组密钥协商和管理方案 被引量:2

Group Key Agreement and Management Scheme for Wireless Ad Hoc Networks
下载PDF
导出
摘要 提出了一种无线Ad Hoc网络组密钥协商和管理方案,协商过程不需网络有特定拓扑结构,节点间不需预先的共享信息,协商结构易于维护,满足Ad Hoc网络无基础结构的特点和网络节点移动产生的密钥更新要求。分析表明,该方案充分考虑Ad Hoc节点分布特点,密钥安全可靠,防止dominator合谋攻击,密钥结构便于管理,节点间通信可靠迅速,减少了通信时延,密钥协商的通信量和计算量较已知协议有改进,适合于各类的无线Ad Hoc网络。 The paper proposes a group key agreement and management scheme for wireless Ad Hoc networks on the basis of the concept of CDS. The process of key agreement doesn't demand any specific topology or previous shared information between nodes, The structure of key agreement can be maintained easily. Analysis shows that the scheme provides more reliable and quick communication, decrease the communication delay, produce better performance. And this scheme prevents the malicious attack raised by some dominators together. The scheme is suitable for Ad Hoc networks of any size.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第4期166-168,共3页 Computer Engineering
关键词 Ad HOC CDS 密钥协商 密钥管理 Ad Hoc Connected dominating set (CDS) Key agreement Key management
  • 相关文献

参考文献5

  • 1Steiner M,Tsudik G,Waidner M.CLIQUES:A New Approach to Group Key Agreement[C].Proceedings of 18th International Conference on Distributed Computing Systems,1998-05.
  • 2Becker K,Wille U.Communication Complexity of Group Key Distribution[C].Proceedings of 5th ACM Conference on Computer and Communications Security,1998-11.
  • 3Kim Y,Perrig A,Tsudik G.Tree-based Group Key Agreement[J].ACM Transactions on Infromation and System Security(TISSEC),2004,7(1):60-96.
  • 4Wan P J,Alzoubi K M,Frieder O.Distrubuted Construction of Connected Dominating Set in Wireless Ad Hoc Networks[J].Mobile Networks and Applications,2004,9(2):141-149.
  • 5Alzoubi K,Wan P J,Frieder O.Message-optimal Connected-dominating-set Construction for Routing in Mobile Ad Hoc Networks[C].Proceedings of 3rd ACM International Symposiumon Mobile Ad Hoc Networking and Computing(MobiHoc'02),2002.

同被引文献9

  • 1蒋毅,史浩山.一种基于移动Ad hoc网络的安全路由策略[J].计算机应用研究,2005,22(10):139-141. 被引量:7
  • 2程艾芝.无线Ad hoc网络的现状研究[J].微处理机,2005,26(6):28-30. 被引量:6
  • 3李芳.移动Ad hoc网络应用及安全问题分析[J].移动通信,2006,30(4):82-85. 被引量:5
  • 4代伟.Ad hoc网络的入侵检测技术[J].重庆大学学报(自然科学版),2006,29(5):120-123. 被引量:2
  • 5Zheng T, Radhakrishnan S, Sarangan V. P-MAC: An Energyefficient MAC Protocol for Wireless Sensor Networks[C]//Proc. of the Parallel and Distributed Processing Syrup.. New York, USA: IEEE Press, 2005: 66-72.
  • 6Rajendran V, Garicia-Luna-Aceves J J, Obraczka K. Energy-efficient Channel Access Scheduling for Power-constrained Networks[C]// Proc. of WPMC'02. New York, USA: [s. n.], 2002: 27-30.
  • 7Wan C Y, Eisenman S E, Campbell A T, et al. Siphon: Overload Traffic Management Using Multi-radio Virtual Sinks[C]//Proc. of the 3rd ACM Conf. on Embedded Networked Sensor Systems. San Diego, USA: ACM Press, 2005: 116-129.
  • 8Rhee N, Warrier A, Aia M, et al. ZMAC: A Hybrid MAC for Wireless Sensor Networks[C]//Proe. of the 3rd ACM Conf. on Embedded Networked Sensor Systems. San Diego, USA: ACM Press, 2005: 90-101.
  • 9Kulkarni S S, Iyer A, Rosenberg C. An Address-light, Integrated MAC and Routing Protocol for Wireless Sensor Networks[J]. IEEE/ACM Trans. on Networking, 2006, 14(4): 790-810.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部