期刊文献+

基于自认证公钥的全分布式移动Ad hoc网络密钥管理方案 被引量:6

Fully-distributed key management scheme based on self-certified public key for mobile Ad hoc network
下载PDF
导出
摘要 针对移动Ad hoc网络中迫切需要解决的安全问题是建立一个安全、高效、可行的密钥管理系统,提出了一种基于自认证公钥,结合全分布式的网络结构的新的适合于Ad hoc网络密钥管理方案。新方案有效地解决了节点间的信任问题,并具有良好的安全性、可用性和扩展性,效率较高,适用于有计划的、长期的Ad hoc网络。 The security issue needed to be solved urgently in mobile Ad hoc network is to build a safe,efficient and feasible key management system.Based on self-certified cryptography and combined with fully distributed network structure,this paper proposed a new public key management scheme which was suitable to mobile ad hoc networks.This new scheme effectively solved the problem of trust between nodes,and had good security,availability and scalability.It has higher efficiency,applies to the planned,long-term Ad hoc network.
出处 《计算机应用研究》 CSCD 北大核心 2008年第6期1779-1782,共4页 Application Research of Computers
基金 国家“十一五”密码发展基金资助项目
关键词 Ad HOC网络 密钥管理 自认证公钥 全分布式 Ad hoc network key management self-certified public key fully distributed
  • 相关文献

参考文献18

  • 1ZHOU L, HAAS Z J. Securing Ad hoc networks [J]. IEEE Network, 1999, 13(6):24-30.
  • 2SHAMIR A. How to share a secret[J]. ACM Comm, 1979, 22 (11) :612-613.
  • 3BECHLER M, HOF H, KRAFT D, et al. A clutter-based security architecture for Ad hoe networks [ C ] //Proc of the 23 rd Annual Joint Conference of the IEEE Computer and Communications Society. Hong Kong: [ s. n. ] ,2004.
  • 4HUBAUX J, BUTTYAN L, CAPKUN S. The quest for security in mobile Ad hoc networks[ C] //Proc of the 2nd ACM Symp on Mobile Ad hoc Networking and Computing. New York: ACM Press, 2001: 146-155.
  • 5CHANDRA J, SINGH L L. A cluster based security model for mobile Ad hoc networks [ C ] //Proc of Personal IEEE International Conference on Wireless Communications. 2005:413-416.
  • 6PERLMAN R. An overview of PKI trust models [ J]. Network, IEEE, 1999,13(6) :38-43.
  • 7ZHOU L, HAAS Z J. Securing Ad hoc networks [J]. IEEE Network Journal, 1999, 13(6) :24-30.
  • 8YI S, KRAVETS R. MOCA: mobile certificate authority for wireless Ad hoc networks[ C] //Proc of the 2nd Annual PKI Research Workshop (PKI2003). 2003:28-29.
  • 9KONG J, ZERFOS P, LUO H, et al. Providing robust and ubiquitous security support for mobile Ad hoc networks[ C] //Proc of the 9th International Conference on Network Protocols (ICNP). 2001:251-260.
  • 10LUO H, ZERFOS P, KONG J, et al. Self-securing Ad hoe wireless networks [ C]//Proc of 7th IEEE Symposium on Computers and Communications ( ISCC' 02). 2002 :567-574.

二级参考文献15

  • 1J P Hubaux,T Gross,et al.Toward Self-organized Mobile Ad hoc Networks:The Terminodes Project[J].IEEE Communications Magazine,2001,(1).
  • 2Lidong Zhou,Zygmunt J Haas.Securing Ad hoc Networks[J].IEEE Networks,1996,13(6).
  • 3Silja Marki,Tuoma Aura,Maarit Hietalahti.Robust Membership Ma-nagement for Ad hoc Groups[Z].
  • 4H Luo,S Lu.Ubiquitous and Robust Authentication Service for Ad hoc Wireless Network[R].Technical Report 200030,UCLA Computer Science Department,2000.
  • 5J Kong, P Zerfos,et al.Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks[J].IEEE ICNP,2001.
  • 6H Luo,et al.Self- securing Ad hoc Wireless Networks[J].IEEE ISCC,2002.
  • 7J P Hubaux,L Buttyan,S Capkun.The Quest for Security in Mobile Ad hoc Networks[J].ACM,2001.
  • 8A Menezes,P Van Orschoc,et al.Handbook of Applied Cryptography[M].CRC-Press,1997.
  • 9L Blazevic,L Buttyan,S Capkun,et al.Self-organized in Mobile Ad hoc Networks:The Approach of Terminodes[J].IEEE Communication Magazine,2001,(6).
  • 10Srdjan Capkun,Levente Buttyan,et al.Self-organized Public Key Management for Mobile Ad hoc Networks[Z].2002.

共引文献2

同被引文献40

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部