期刊文献+

一种新的移动Ad Hoc网络的安全解决方案 被引量:1

A New Security Solution Scheme of Mobile Ad Hoc Networks
下载PDF
导出
摘要 基于自发证书的移动Ad Hoc网络(MANET)安全解决方案采用的证书选择算法只能从概率统计上保证获得一条证书链、要求节点具备较高的存储能力和计算能力、缺乏证书管理机制。文章结合自发证书和证书链思想,提出了一种新的MANET安全解决方案,从改进证书管理、获取目的节点可信公钥、提出基于质询-签名机制双向身份认证方法和保障安全通信4方面加强其安全性。 A secure solution scheme based on certificates issued by nodes themselves has been proposed for mobile ad hoc networks (MANETs). The certificate hunter algorithm which the scheme uses can only assure obtain a certificate link in probability. It also requires that nodes have good storage and computing capability, and is short of certificate management. Combining the idea of issuing certificates nodes themselves and certificate link, this paper proposes a new security solution scheme of MANETs, which enhances the security from improving certificate management, how to obtain the verifiable public key of destination node, proposing mutual entity authentication based on challenge-signature and securing communication.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第14期143-145,共3页 Computer Engineering
基金 国家"863"计划基金(2002AA783043)
关键词 证书管理 基于用户标识符 质询-签名 移动AD HOC网络 Certificate management Identify-based Challenge-signature Mobile ad hoc networks
  • 相关文献

参考文献3

  • 1Yang Hao,Luo Haiyun,Ye Fan.Security in Mobile Ad Hoc Networks:Challenges and Solutions[J].IEEE Wireless Communications,2004,11(1).
  • 2麻晓园,陈前斌,李云.移动Adhoc网络中的密钥管理[J].通信技术,2003,36(10):121-123. 被引量:3
  • 3Shamir A.Identity-based Cryptosystems and Signatures Schemes[C].Proceedings of the Advances in Cryptology,1984.

二级参考文献11

  • 1[1]IETF Manet Charter, http://www. ietf. org/html. charters/manetcharter. html
  • 2[2]Zhou L, Haas Z J. Securing Ad Hoc Networks. IEEE Networks,1999; 13(6)
  • 3[3]Shamir A. How to Share a Secret. Communications of ACM, 1979; 22(11): 612~613
  • 4[4]Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing.Extended abstract, 1995
  • 5[5]Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting. CRY PTO' 99, 1999
  • 6[6]Luo H, Lu S. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report 200030, UCLA Computer Science Department, 2000
  • 7[7]Hubaux J P, Buttyán L, Capkun S. The Quest for Security in Mobile Ad Hoc Networks. ACM MobiHoc, 2001
  • 8[8]Basagni S, Herrin K, Rosti E, et al. Secure Pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001:156 ~ 163
  • 9[9]Balfanz D, Smetters D K, Stewart P, et al. Talking To Strangers:Authentication in Ad - Hoc Wireless Networks. Internet Society,Conference Proceeding of NDSS Conference 2002
  • 10[10]Asokan N, Ginzborg P. Key Agreement in Ad Hoc Networks. Computer Communications 2000; 23

共引文献2

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部