期刊文献+

Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5

Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model
下载PDF
导出
摘要 In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Funda-tion of China (60403027)
关键词 Ad Hoc networks self-organize bidirectional trust public key management. Ad Hoc networks self-organize bidirectional trust public key management.
  • 相关文献

参考文献4

  • 1Kong J,Zerfos P,Luo H,et al.Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks[]..2001
  • 2McKenney P,Bausbacher P.Physical and Link Layer Mod- eling of Packet Radio Network Performance[].IEEE Journal on Selected Areas in Communications.1991
  • 3Douceur J.The Sybil Attack[]..2002
  • 4Peterson L L,Davie B S.Computer Networks :A Systems Approach[]..2000

同被引文献41

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部