期刊文献+

基于绝对信任模型的Ad Hoc网络自组织公钥管理机制 被引量:1

A Absolute Trust Model Based Self-organized Public-key Management for Mobile Ad Hoc Networks
下载PDF
导出
摘要 传统网络中的身份认证工作一般都是由证书权威(CA)来完成,但在分布式的移动AdHoc网络中很难实现这种集中式的身份认证机制,引入这样的中心机构会带来潜在的安全威胁,一旦中心机构遭到破坏,将导致整个网络瘫痪,所以只能寻找其它更合适的方式来进行认证.本文提出一种基于绝对信任模型的自组织公钥管理方案,通信实体自己产生公私钥并颁发证书,不需要任何信任第三方以及认证服务器,信任关系按照自然人的可信关系得到可信传播,相对传统的自组织公钥管理,具备更短的平均认证路径长度以及较高的认证通过率,更重要的是,绝对信任证书模型更加符合实际中通信主机之间的信任需求. In traditional networks, the authentication is performed by certificate authoritys (CA),which can't be built in distributed Ad Hoc Networks however. The centralized CA will bring the potential security threatens and whole network will be destroyed once the CA is invaded. So it is needed to find a more suitable mechanism to perform the authentication. In this paper, we propose a fully self-organized public-key management based on absolute trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-Organized Public-Key Management, the average certificates paths get more short ,the authentication pass rates gets more high and the most important is that the absolute based model fits the trust requirement of each host better.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第2期260-265,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60403027)资助.
关键词 移动自组网 绝对信任 公钥管理 身份认证 ad hoc networks absolute trust public-key management authentication
  • 相关文献

参考文献9

  • 1Zhou L,Haas Z.Securing ad hoc networks[J].IEEE Network,November/December 1999,13(6):24-30.
  • 2Kong J,Zerfos P,Luo H,et al.Providing robust and ubiquitous security support for mobile ad hoc networks[C].In:Proceedings of the 9th International Conference on Network Protocols (ICNP),November 2001.
  • 3Douceur J.The sybil attack[C].In:Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS),2002.
  • 4Capkun S,Buttyan L,Hubaux J-P.Mobile computing[J].IEEE Transactions on,Jan.-March 2003,2(1):52-64.
  • 5McKenney P,Bausbacher P.Physical and link layer modeling of packet radio network performance[J].IEEE Journal on Selected Areas in Communication,1991,9(1):59-64.
  • 6Larry L Peterson,Bruce S Davie.Computer networks:a systems approach (Second Edition)[M].Morgan Kaufmann Publishers,Inc:193-195.
  • 7Camp T,Boleng J,Davies V.A survey of mobility models for ad hoc network research[J].Wireless Communications and Mobile Computing (WCMC):Special issue on Mobile Ad Hoc Networking:Research,Trends and Applications,2002,2(5):483-502.
  • 8Riley G F,Ammar M H,Fujimoto R M,et al.Distributed network simulations using the dynamic simulation backplane[C].Distributed Computing Systems,2001.21st International Conference on:181-188.
  • 9Li Xiao-qi,Lyu M R,Liu Jiang-chuan.A trust model based routing protocol for secure ad hoc networks[C].Aerospace Conference,2004,Proceedings,2004 IEEE,March 6-13,2004,2:1286-1295.

同被引文献3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部