期刊文献+

量子保密与免疫机制在Ad Hoc网络的应用 被引量:1

Application of the Quantum Encryption and the Immune System in the Ad Hoc
下载PDF
导出
摘要 针对AdHoc网络中存在的安全问题,利用量子通信绝对安全的特性和细胞自我免疫系统的性质,将二者有机地结合在一起,有效地提高了AdHoc的安全性能。分析结果表明,结合量子密钥分发以及细胞自我免疫技术之后,AdHoc网络仍然具有明显而且优越的自组织性和适应性,更重要的是,安全性能可以得到很大改善。对于未来军事通信中网络安全的发展起到关键作用。 The security trouble in Ad Hoc network was been analyzed in the paper, and a solution which combines the absolute security of quantum communication with the cell immune system was put forward to enhance effectively the security in Ad Hoc network. The analysis showed that, after being integrated with the quantum key distribution and the cell immune system, the Ad Hoc network still has the autonomy and the adaptability. More important, its security has got great improvement. The research plays a key role in the military communication network security in the future.
出处 《无线电工程》 2008年第2期7-9,19,共4页 Radio Engineering
关键词 量子保密术 细胞免疫系统 无线移动自组网 网络安全 quantum cryptology cell immune system Ad Hoc network security
  • 相关文献

参考文献5

  • 1JOHNSON D B, MALTZ D A. Dynamic Source Routing in Ad Hoc Wireless Networks [ M ]. USA : Mobile Computing, 1996 : 153- 181.
  • 2YI P,YAO Y,HOU Y F,et al.Securing Ad Hoe Networks through Mobile Agent [ C ]. China: Proceedings of the 3rd International Conference on Information Security,2(D4:125- 129.
  • 3PAPADIMITRATOS P, HAAS Z. Secure Routing for Mobile Ad Hoc Networks [ C ]. USA: In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002:27 - 31.
  • 4GISIN N, RIBORDY G,TITrEL W, et al. Quantum Cryptography [ M ]. USA: Reviews of Modem Physics,2002 : 145 - 195.
  • 5钟穗,何明德.基于BB84的量子密钥分配协议的研究[J].计算机应用研究,2003,20(1):35-37. 被引量:4

二级参考文献2

共引文献3

同被引文献11

  • 1贺昕,周正.MANET路由选择协议性能分析[J].无线电工程,2005,35(2):7-10. 被引量:2
  • 2蔡艳峰,邹传云.Ad Hoc网带预测后备路由算法研究[J].无线电通信技术,2006,32(4):4-6. 被引量:2
  • 3JOHNSON D B,MALTZ D A.Dynamic Source Routing in ad hoc Wireless Networks [ J ]. Mobile Computing, 1996, 353:153-181.
  • 4CULPEPPER B J,TSENG H C.Sinkhole Intrusion Indica- tors in DSR MANETs[ C]//ln Proceedings of BroadNets, 2004:681-688.
  • 5SYYVERSON P F,OORSCHOT V P C.A Unified Crypto- graphic Protocol Logic [ C ]//In Proceedings of the 1994 IEEE Computer Society Press, 1994: 14-28.
  • 6YOON H,CHEON J H,KIM Y. Bawh verifications with II)-based signatures[ C ]//IEEE Press, 2005 : 233-248.
  • 7BURROWS M,ABADI M,NEE|)HAM R.A Logic of Au- thentication[ C]//ln Proceedings of the 12th Symposium on Operating System Principles, 1990,8 ( 6 ) : 18- 36.
  • 8NEEDHAM R, SCHROEDER M.Using Encryption for Au- thentication in Large Networks of Computers [ J ]. Commu- nications of the ACM, 1978,21 (12) :993-999.
  • 9NEUMAN B C,Ts' o T.Kerberos : An Authentication Serv- iee for Computer Networks [ J ]. IEEE Communications Magazine, 1994,32(9) :33-38.
  • 10GONG L,NEEDHAM R,YAHALOM R. Reasoning about Belief in Cryptographic Protocols[ C ]//In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990:234-248.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部