期刊文献+

大规模Ad hoc网络中一种高效的组密钥协商协议 被引量:2

Efficient group key agreement protocol for large Ad hoc networks
下载PDF
导出
摘要 移动Ad hoc网络自身的特点决定了该网络中节点资源的有限性,所以在移动Ad hoc网络中构建组密钥协商协议时,应尽量减少节点的资源开销。为了解决这个问题,提出了一种基于分簇-K叉树组模型结构的组密钥协商协议——CKT-ECC协议。该协议在分簇-K叉树组模型结构上,采用椭圆曲线密码体制实施密钥协商和分配,使得节点在密钥协商过程中具有低计算开销和低通信开销的优势。与GDH、TGDH组密钥协商协议相比,本协议有效地降低了节点在密钥协商过程中的计算开销和通信开销,适用于大规模移动Ad hoc网络。 Mobile Ad hoc networks is a new-style mobile multihop wireless networks.Resource of the nodes in Ad hoc networks is limited.So the costs of the nodes resource should be minimized whenever constructing the group key agreement protocol in the Ad hoc networks.To solve this problem,this paper proposed a security efficient group key agreement protocol based on a cluster-K-tree structure referred as CKT-ECC.In the CKT-ECC protocol the elliptic curve cryptosystem was employed on clusterK-tree structure to establish and allocate group key.So the protocol had some advantages that were the cost of computation and communication on node in key agreement process was low.Finally,compared the proposed protocol with TGDH and GDH group key agreement protocols,the analysis results showed that the protocol decreased both the computational overhead and communication costs and adapted to the large mobile Ad hoc networks.
出处 《计算机应用研究》 CSCD 北大核心 2008年第6期1817-1821,1824,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(60403027) 中国地质大学(武汉)优秀青年教师计划资助项目(CUGQNL0836)
关键词 AD HOC网络 组密钥协商 椭圆曲线 K叉树 Ad hoc networks group key agreement elliptic curve cluster K-tree
  • 相关文献

参考文献12

  • 1STEINER M, TSUDIK G, WAIDNER M. Differ-Hellman key distribution extended to group communication [ C ] //Proc of Usenix Conference on Computer and Communications Security. New York:ACM Press, 1996:31-37.
  • 2STEINER M, TSUDIK G, WAIDNER M. DLIQUES:a new approach to group key agreement [ C ] //Proc of the 18th International Conference on Distributed Computing Systems. Washington DC: IEEE Computer Society, 1998:380-387.
  • 3STEINER M, TSUDIK G, WAIDNER M. Key agreement in dynamic peer groups [ J ]. IEEE Trans on Parallel and Distributed Systems, 2000, 11 (8) :769-780.
  • 4KIM Y, PERRING A, TSUDIK G. Tree-based group key agreement [J]. ACM Trans on Information and System Security, 2004, 7 ( 1 ) :60-96.
  • 5LI J H., LEVY R, YU M. A scalable key management and clustering scheme for Ad hoc networks [ C ] //Proc of INFOSCALE'06. New York : ACM Press, 2006 : 1 - 10.
  • 6LI D, SAMPALLI S. An efficient group key establishment in location-aided mobile Ad hoc networks [ C ] //Proc of PE-WASUN' 05. New York : ACM Press, 2005:57- 64.
  • 7CHEE J, TEO M, TAN C.. Energy-efficient and scalable group key agreement for large Ad hoe networks [ C ] //Proc of PE-WASUN05. New York : ACM Press, 2005 : 114-121.
  • 8SMART N. The discrete logarithm problem on elliptic curves of traces one [ J ]. Journal of Cryptology, 1999, 12 (3) : 193-196.
  • 9MENEZES A, OKAMOTO T, VANSTONE S. Reducing elliptic curve logarithms to logarithms in a finite field [ J]. IEEE Trans on Information Theory, 1993, 39 (5) : 1639-1646.
  • 10OORSCHOT P, WIENER M. Parallel collision search with cryptanalytic applications [ J ]. Journal of Cryptology, 1999,12 ( 1 ) : 1-28.

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部