期刊文献+

改进型安全自组网按需距离向量路由协议研究

Study on Improved Secure Ad Hoc on-Demand Distance Vector Routing Protocol
下载PDF
导出
摘要 提出了一种新的效能较高的具备安全鉴别功能的自组网按需距离向量路由协议ESAODV。该安全协议采用HORSEI认证机制,其签名和验证的计算速度比公钥算法快很多,它的安全性基于单向散列算法,且不需收发者之间的时间同步。理论分析和网络仿真结果表明,与最新因特网协议草案所提出的方案相比,安全协议ESAODV具有较好的性能和实用性。 This paper presents a new efficient secure Ad hoc on - demand distance vector routing protocol (ESAODV). The pro- tocol takes the HORSEI for authentication, with higher signing and verifying speed than that of public key based authentication schemes. The security of the protocol relies on the one way hashing and needn1 time synchronization. Compared with the latest Intemet draft of SAODV, ESAODV is proved to be more efficient and practical through theoretical analysis and simulation.
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2007年第2期70-73,共4页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 国家自然科学基金资助项目(60574088) 国家自然科学基金资助项目(60672137)
关键词 自组网 网络安全 路由协议 ad hoc security routing protocol
  • 相关文献

参考文献10

  • 1PERKINS C E,BELDING-ROYER E M,DAS S.Ad hoc on demand distance vector (AODV) routing[S].IETF RFC 3561,1999.
  • 2ZAPATA M.Secure ad hoc on demand distance vector routing[DB/OL].[2006-09-13].http://bgp.potaroo.net/ietf/all-ids/draft-guerrero-manet-saodv-00.txt.
  • 3STALLINGS W.Cryptography and network security principles and practice[M].2nd ed.Beijing:Press of Tsinghua University,2002.
  • 4LESLIE L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772.
  • 5RALPH C M.Protocols for public key cryptosystems[C].In Proceedings of the IEEE Symposium on Research in Security and Privacy.1980:122-133.
  • 6PERRIG A,CANETTI R,SONG D,et al.Efficient and secure source authentication for multicast[C].In Proceedings of the 2001 Symposium on Network and Distributed Systems Security (NDSS '01).2001:35-46.
  • 7YANG Mingxi,LI Layuan,FANG Yiwei.Securing Multicast Route Discovery for Mobile Ad Hoc Networks[J].Wuhan University Journal of Natural Sciences,2007,12(1):189-192. 被引量:3
  • 8WILLIAM D N.HORSE:an extension of an r-time signature scheme with fast signing and verification[C].International Conference on Information Technology:Coding and Computing (ITCC'04).NV:Las Vegas,2004:5-7.
  • 9LEONID R,NATAN R.Better than biba:short one-time signatures with fast signing and verifying[C].Information Security and Privacy:7th Australasian Conference.Australia:Melbourne,2002:3-5.
  • 10杨铭熙,李腊元.基于门限机制的移动Ad hoc网络密钥分发协议[J].武汉理工大学学报(信息与管理工程版),2005,27(2):64-67. 被引量:2

二级参考文献13

  • 1Shamir A. How to Share a Secret [ J ]. Communications of the ACM, 1979,24( 11 ) :612 - 613.
  • 2Asmuth C,Bloom J. A Modular Approach to Key Safeguarding[ J ]. IEEE Transactions on Information Theory,1983,29(2) :208 -210.
  • 3Stallings W. Cryptography and Network Secnrity: Principles and Practice [ M ]. Prentice: Prentice - Hall, Inc.2002.
  • 4Deng H,Mukherjee A,Agrawal D P. Threshold and Identity- based Key Management and Authentication for Wireless Ad Hoc Networks [ A ]. Proceedings of the International Conference on Information Technology:Coding and Computing ( ITCC 04 ) [ A ]. Las Vegas,2004.
  • 5Burnett S,Paine S. Security's Official Guide to Cryptography [ M ]. Columbus: McGraw - Hill Companies,2001.
  • 6Perrig A,Canetti R,Song D, et al.Efficient and Secure Source Authentication for Multicast[]./Network and Distributed System Security Symposium(NDSS ).2001
  • 7Zhu Yufang,Kunz T.MAODV Implementation for NS-2.26 (SCE-04-01[]..2004
  • 8Stallings W.Cryptography and Network Security Principles and Practice[]..2002
  • 9Neumann W D.HORSE: An Extension of an r-Time Signature Scheme with Fast Signing and Verification[]./ International Conference on Information Technology: Coding and Computing(ITCC’).2004
  • 10Luo Haiyun,Kong Jiejun,Zerfos P, et al.URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[].IEEE ACM Transactions on Networking.2004

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部