期刊文献+

无线分布式网络认证及密钥协商机制研究 被引量:2

Research on Authentication and Key Agreement for Wireless Distributed Network
下载PDF
导出
摘要 无线分布式网络的路由机制已经相当成熟,但无线的开放性、自组织网络拓扑的不确定性以及无线设备资源的有限性为其安全性带来了一定挑战。本文针对无线自组织网络的这些特点,提出了一种安全的无线分布式网络模型SAM-DN,引入了分布式认证中心进行密钥协商。并采用ECC代替了传统的RSA加密算法。这些新机制配合SAM-DN自身的特点,使得该模型能更好适应无线分布式网络带宽、计算能力及存储空间的有限资源。 The route mechanism of wireless distributed network has developed maturely, but the security is still unsolved due to the openness, mobility and resource limitation. This paper gives out a security wireless distributed network model which is called SAM-DN, introduces distribute certification authority to intermediate key agreement, and uses ECC to take instead of traditional RSA en- cryption arithmetic. All above novel mechanisms make the SAM-DN adapt well to the limited bandwidth, computation capacity and storage.
出处 《微计算机信息》 北大核心 2007年第24期45-47,183,共4页 Control & Automation
基金 国家自然科学基金--支持群特性的动态凝聚层移动网络模型研究(No:60572047) 湖北省科技攻关项目--基于3G核心网边缘会话控制网络设备研制(No:2006AA102A04)
关键词 无线分布式网络 SAM-DN 椭圆曲线密码 密钥协商 wireless distributed network, SAM-DN, ECC, Key Agreement
  • 相关文献

参考文献6

  • 1贾月琴,张宁,宋晓虹.对网格安全技术的讨论[J].微计算机信息,2005,21(3):199-200. 被引量:53
  • 2A.Khalili, J Kate, and W.A. Arbaugh, "Toward secure key distribution in truly ad-hoc networks." In Proc. of IEEE WSAAN' 03. pp.342-346, 2003.
  • 3A.Welmerskirch and G. Thonet, "A distributed Lightweight authentication model for ad-hoc networks," in Lecture Notes in Computer Science, K.Kim, Ed., vol.2288, Springer-Verlag, pp. 314-324 2002.
  • 4Jingfeng Li, Yuefei Zhu, Heng Pan, Shengli Liu. "A Distributed Certificate Revocation Scheme Based on One-way Hash Chain fro Wireless Ad Hoc Network"
  • 5Ai-fen Sui Lucas C. K. Hui S. M. Yiu K. P. Chow "An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy for Wireless Mobile Communication"
  • 6Michael Rosing ,chapter5 《Implementing Elliptic Curve Cryptography》, Softbound, 1998 《SEC 1: Elliptic Curve Cryptography》, Certicom Corp., 2000 《IEEE P1363a / D9》, 2001

二级参考文献7

  • 1I.Foster,C.Kesselman,and S.Tuecke. The Anatomy of the Grid :Enabling Scabling Virtual Organizations [J]. Int′ l J.Supercomputer Applications,2001 ,vol. 15 ,no. 3.
  • 2L. Pearlman and colleagues. A Community Authorization Service for Group Collaboration[J].Proc. IEEE CS Press, 2002, pp.50-60.
  • 3Lavanya Ramakrishnan. Grid computing-Securing next-generation grids[J].IT Professional, 2004,Volume(6),Issue(2):34-39.
  • 4肖侬.课程讲义:《网格安全技术》[EB/OL].http://www.chinagrid.net/,2004.
  • 5.公钥安全体系简介[EB/L].http://www.cdpmh.com/SSL/SSL-1.htm,2002.
  • 6.[EB/OL].http://www -900.ibm.com/developerWorks/cn/grid/gr -security/index.shtml,2003,12.
  • 7邹炜,孙家骕,孙艳春.青鸟网上构件库系统的访问控制机制[J].软件学报,2002,13(1):92-98. 被引量:5

共引文献52

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部