期刊文献+

基于CPK的高效移动Ad Hoc网络密钥管理方案 被引量:2

Efficient key management scheme based on CPK for mobile Ad Hoc networks
下载PDF
导出
摘要 移动Ad Hoc网络具有的动态网络拓扑、无线链路的弱安全性、节点的有限物理保护和无中心基础结构等特性,使得它面临严重的安全问题。因此鲁棒的密钥管理服务是移动Ad Hoc网络的安全基础。提出了一个基于椭圆曲线组合公钥方案和门限密码系统的移动Ad Hoc网络密钥管理方案。本方案的主要创新点是提出了三层密钥管理模型,并基于此模型,提出了节点密钥生成、密钥份额分发、节点密钥更新、密钥份额更新和密钥撤销的具体实现。三层密钥管理模型实现较高的安全性和较低的密钥管理开销。与基于证书的和基于身份的密钥管理方案相比,本方案在安全性和效率方面更加适用于移动Ad Hoc网络。 Mobile Ad Hoc Networks (MANETs) face serious security problems due to their unique characteristics such as dynamic topology, vulnerability of weak-secure wireless link, limited physical protection of each node, and lack of central infrastructure. Robust key management services are central to ensuring security of mobile Ad Hoc networks. A novel robust key management scheme for MANETs is proposed based on Elliptic Curve Combined Public Key (ECCPK) scheme and the threshold cryptosystem. The major innovative point of this scheme was the proposal of three-tier key management model to provide high security, low key management [oad. Based on three-tier key management model, the node' s key generation, secret share distributing, node' s key updating, secret share refreshing and key revocation approaches are proposed. Compared with the security and efficiency of the certificate-based and the identity-based key management schemes, the new scheme is more suitable for the mobile Ad Hoc networks.
出处 《计算机应用》 CSCD 北大核心 2008年第8期1916-1919,共4页 journal of Computer Applications
基金 国家863计划项目(2006AA01Z422) 国家自然科学基金资助项目(60672102)
关键词 组合公钥 门限密码 移动AD Hoc网络 椭圆曲线 Combined Public Key (CPK) threshold cryptograph mobile Ad Hoc networks elliptic curve
  • 相关文献

参考文献9

  • 1ZHOU LIDONG, HAAS Z J. Securing Ad hoe networks[ J]. IEEE Network Magazine, 1999, 13(6) : 24 - 30.
  • 2KONG JIEJUN, ZERFOS P, LUO HAIYUN, et al. Providing robust and ubiquitous security support for MANET[ EB/OL]. [ 2007 - 10 - 20]. http://irl. cs. ucla. edu/papers/ICNP01 -haiyun. pdf..
  • 3LUO HAIYUN, KONG JIEJUN, ZERFOS P, et al. URSA: Ubiquitous and robust access control for mobile Ad hoc networks[ EB/OL]. [2007 - 10 -20]. http://www, cs. ucla. edu/-lixia/papers/ 04TON_URSA. pdf.
  • 4LUO HAI-YUN, LU SONG-WU, Ubiquitous and robust authentication services for Ad hoc wireless networks[ EB/OL]. [ 2007 - 10 - 20]. http://camars, kaist, ac. kr/-hyoon/courses/cs710_2002_fall/2002cas/security/papers/%5B8%5D. pdf.
  • 5LUO HAI-YUN, ZERFOS P, KONG JIE-JUN, et al. Self-securing Ad hoc wireless networks[ EB/OL]. [ 2007 - 11 - 20]. http:// www-sal.cs. uiuc. edu/-haiyun/publications/ISCC02, pdf
  • 6HUBAUX J P, BUTTYAN L, CAPKUN S. Self-organized publickey management for mobile Ad hoc networks[ 2007 - 11 -23]. http://ic2. epfl. ch/publications/documents/IC_TECH_REPORT_200234. pdf.
  • 7KHALILI A, KATZ J, ARBAUGH W A. Towards secure key distribution in truly Ad hoc networks[ EB/OL]. [2007 - 11 - 25]. http://www, cs. rand. edu/-jkatz/papers/id_threshold, ps.
  • 8DENG HONGMEI, MUKHERJEE A, AGRAWAL D P. Threshold and identity-based key management and authentication for wireless Ad hoc networks[C]// Information Technology: Coding and Computing. Washington: IEEE Computer Society, 2004:107-111.
  • 9LI JINGFENG, WEI DAWEI, KOU HONGZHAO. Identity-based and threshold key management in mobile Ad hoc networks[C]// Wireless Communications, Networking and Mobile Computing. New York: IEEE, 2006:1 -4.

同被引文献12

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部