期刊文献+

基于分簇结构的Ad Hoc网络中门限密钥管理方案 被引量:2

Cluster-based Threshold Key Management Scheme in Ad Hoc Network
下载PDF
导出
摘要 基于分簇的网络结构给出了一种新的Ad Hoc网络密钥管理方案.方案中无需可信赖的第三方,并且使用了门限技术将PKG(public key generation)的功能分散到簇头节点上,提高了系统的安全性.采用基于身份的加密算法,用户之间无需进行公钥认证,有效地降低了用户终端计算、存储能力的需求和系统密钥管理的通信开销. Promotes a cluster-based threshold key management scheme. In this scheme, public key certificates are not needed and every participant can use his identity as public key, and the function of PKG (Public Key Generation) is distributed to the cluster head nodes. It greatly decreases the need of the ability for computation and storage of clients' terminals, as well as communication overhead for system key management.
出处 《福建师范大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第5期31-35,共5页 Journal of Fujian Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(60502047) 福建省科技厅基金资助项目(2006F5036)
关键词 Ad HOC网络 分簇 密钥管理 门限 Ad Hoc network clustering key management threshold
  • 相关文献

参考文献10

  • 1张桢萍,许力,叶阿勇.移动Ad Hoc网络中的组密钥管理策略[J].计算机应用,2005,25(12):2727-2730. 被引量:4
  • 2Zhou L,Haas Z J.Securing Ad Hoc networks[J].IEEE Network,1999,13:24-30.
  • 3Luo H,Zerfos P,Kong J,et a1.Self-securing Ad Hoc wireless networks[J/OL]∥7th IEEE Symp on Computers and Communications,2002,567-574.http:∥www-sal.cs.uiuc.edu/haiyun/publications/ISCC02.pdf.
  • 4Hubaux J P,Buttyan L,Capkun S.Self-organized public-key management for mobile Ad hoc networks[J].IEEE Transactions on Mobile Computing,2003 2(1):52-64.
  • 5Khalili A,Katz J,Arbaugh W A.Towards secure key distribution in truly Ad Hoc net wor-ks[J/OL]∥Proc of IEEE Workshop on Security and Assurance in Ad hoc Networks,2003.http:∥www.cs.umd.edu/jkatz/papers/id-threshold.ps.
  • 6Li Guangsong,Han Wenbao.A new scheme for key management in Ad Hoc networks[C/OL]∥Proceeding of 4th International Conference on Networking,LNCAS 3421,2005.http:∥www.springerlink.com/content/v9uybwa7d0dlk30q/.
  • 7Shamir A,How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 8章静 许力 黄榕宁.自组网中可信的分簇策略[C].第二届中国可信计算与信息安全学术会议论文集[J].武汉大学学报,2006,.
  • 9张桢萍,许力,陈志德.门限密钥管理策略安全性的动态分析[J].福建电脑,2007(5):5-6. 被引量:1
  • 10李光松,韩文报.分簇Ad Hoc网络的密钥管理[J].计算机科学,2006,33(2):79-82. 被引量:6

二级参考文献34

  • 1陆军,丁雪梅.Ad-hoc网络动态密钥管理[J].信息技术,2004,28(7):76-78. 被引量:2
  • 2叶阿勇,许力.移动Ad Hoc网络安全策略研究[J].微计算机应用,2004,25(4):385-390. 被引量:5
  • 3许力,张继东,郑宝玉,杨震.移动自组网能量保护策略研究进展[J].通信学报,2004,25(9):93-103. 被引量:16
  • 4史庭俊,王超,马建峰.先应秘密共享系统安全性的动态分析和评估[J].西安电子科技大学学报,2004,31(6):905-909. 被引量:1
  • 5RAMANATHAN R,REDI J.A Brief Overview of Ad Hoc Networks:Challenges and Directions[J].IEEE Communication Magazine,2002,23 (5):48-53.
  • 6ZHOU L,HAAS ZJ.Securing Ad Hoc Networks[J].IEEE Networks,1999,13(6).
  • 7HARNEY H, MUCKENHIRN C.Group key management protocol(GKMP) specification.RFC2093[S]. 1997.
  • 8HARNEY H, MUCKENHIRN C.Group key management protocol(GKMP) architecture. RFC2094[S]. 1997.
  • 9WALLNER D, HARDER E, AGEE R.Key management for multicast: Issues and architec-tures. RFC 2627[S]. 1999.
  • 10WALDVOGEL M, GARONNI G, SUN D,et al.The VersaKey framework: Versatile group key management[J]. IEEE Journal on Selected Areas in Communications(Special Issue on Middleware), 1999,17(9):1614-1631.

共引文献8

同被引文献17

  • 1李光松,韩文报.基于签密的Ad Hoc网络密钥管理[J].计算机工程与应用,2005,41(12):160-164. 被引量:7
  • 2Li Guangsong,Han Wenbao.New Scheme for Key Management in Ad Hoc Networks. In:Proceeding of 4th International Conference on Networking,LNCS 3421,2005.
  • 3Li Guangsong,Han Wenbao.Cluster-Based Key Management in Ad Hoc Networks,2006.
  • 4Hongmei Deng, Annindo Mukherjee, and Dharma P. Threshold and Identity-based Key Management and Authentication forWireless Ad Hoc Networks.
  • 5Zhou L,Haas Z J.Securing Ad hoc networks[J].IEEE Networks Special Issue on Network Security, 1999, 13(6) :24-30.
  • 6Luo H,Zerfos P,Kong J.Self-securing Ad hoc wireless networks[C]// 7th IEEE Syrup on Computers and Commtmications,2002: 567-574.
  • 7Hubaux J P,Buttyan L,Capkun S.The quest for security in mobile Ad hoc networks[C]//Proc of the 2001 ACM International Symposium on Mobile Ad hoc Networking & Computing 2001, Long Beach,CA,USA,2001 : 146-155.
  • 8Yi S, Kravets R.Composite key management for ad hoc networks[C]//Proeeedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004.
  • 9Khalili A, Katz J, Arbaugb W A.Towards secure key distribution in. truly Ad hoc networks[DB/OL]. (2003).http://www.gta. ufrj.br/-eric/tese/artigos/id.
  • 10Deng H, Mukherjee A, Agrawal D, Threshold and identity-based key management and authentication for wireless Ad hoc networks[C]// Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC) ,2004: 107-111.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部