期刊文献+

自组网中一种新的组密钥更新策略

New Group Rekeying Scheme for Multicast in Ad Hoc Networks
下载PDF
导出
摘要 组播是自组网应用中的一个重要组成部分,如何对组播通信中的密钥进行管理,使得密钥能够安全地分发和高效地更新是目前的一个研究热点。该文提出了一种新的组密钥更新策略。利用多个密钥池进行密钥预分发,建立对称密钥进行组密钥的更新,基于ID的密码系统,降低节点的计算量和通信量。该策略的安全模型符合主动外部攻击模型,满足强安全性。对新策略的安全和性能进行了详细的分析。 Multicast is one of the important components in Ad Hoc networks. Key management is the hotspot of study for secure group key distribution and efficient rckcying at present. A new group rckcying scheme is proposed, which uses multiple key pools in key prc-distribution phase and establishes pairwisc keys for group rckeying. The new scheme using identity-based cryptographic lowers the computational and communicational costs of nodes. And its security model adapts to the active outsider attack model and meets strong-security. This paper analyzes the new scheme in terms of network security and performance overhead.
作者 陈建伟 许力
出处 《计算机工程》 CAS CSCD 北大核心 2007年第24期164-167,共4页 Computer Engineering
基金 国家自然科学基金资助项目"安全和能量感知的可编程复杂动态自组织网络研究"(60502047) 福建省自然科学基金资助项目"基于能量感知的可编程自组织网络的安全路由协议"(A0440001)
关键词 自组网 组播 密钥管理 组密钥更新 Ad Hoc networks multicast, key management group rckcying
  • 相关文献

参考文献15

  • 1Debby M W,Eric J H,Ryan C A.Key Management for Multicast:Issues and Architectures[S].RFC 2627,1999.
  • 2Wong C K,Gouda M,Lam S S.Secure Group Communications Using Key Graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16-30.
  • 3David A M,Alan T S.Key Establishment in Large Dynamic Groups Using One Way Function Trees[R].TLS Labs,Network Associates,Inc.,1998.
  • 4Moharrum M,Mukkamala R,Eltoweissy M.CKDS:An Efficient Combinatorial Key Distribution Scheme for Wireless Ad-Hoc Networks[C]//Proc.of IEEE International Conference on Performance,Computing,and Communications.[S.l.]:IEEE Press,2004:631-636.
  • 5Zhu S,Setia S,Xu S,et al.GKMPAN:An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks[C]//Proc.of International Conference on Mobile and Ubiquitous Systems:Networking and Services.Boston,Massachusetts:[s.n.],2004:42-51.
  • 6]Wang W,Bhargava B.Key Distribution and Update for Secure Inter-group Multicast Communication[C]//Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Network'05.[S.l.]:ACM Press,2005:43-52.
  • 7Shamir A.Identity-based Cryptosystems and Signature Schemes[C] //Proc.of Cryptology-Crypto'84.Berlin:Springer-Verlag,1984:47-53.
  • 8Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proc.of Cryptology-Crypto'01.Germany:Springer-Verlag,2001:213-229.
  • 9Sakai R,Ohgishi K,Kasahara M.Cryptosystems Based on Pairings[C]//Proc.of the 2000 Symposium on Cryptography and Information Security.Okinawa:[s.n.],2000.
  • 10Waldvogel M,Caronni G,Sun D,Weiler N,et al.The VersaKey Framework:Versatile Group Key Management[J].IEEE JSAC,1999,17(9):1614-1631.

二级参考文献7

  • 1叶阿勇,许力.移动Ad Hoc网络安全策略研究[J].微计算机应用,2004,25(4):385-390. 被引量:5
  • 2RAM R, JASON R. A brief overview of mobile Ad Hoc networks:challenges and directions [ J]. IEEE Communications Magazine,May 2002,40(5) : 20 -22.
  • 3许力,钱晓聪.移动自组网环境下基于图论的智能优化分簇策略[A].2005年中国计算机大会论文集[C].北京:清华大学出版社,2005.10.
  • 4BECHLER M, HOF H-J, PAHLKE DK, et al. A cluster-based security architecture for ad hoe networks[ J]. proc. IEEE. INFOCOM,2004, 4:2393 - 2403.
  • 5SEUNGHUN J, CHANIL P, DAESEON C, et al. Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network[ J]. ETRI journal,2005, 27(4) : 465 - 468.
  • 6LI X-Y, WAMG Y, FRIEDER O. Efficient hybrid key agreement protocol for wireless ad hoc networks[ J/OL]. http://www. Is. lit.edu/- xli/, 2003.
  • 7KIM Y, PERRING A, TSUDIK G. Tree-based Group Key Agreement[J]. ACM Transaction on Information and system security, 2004, 7(1):60 - 96.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部