期刊文献+

一种基于冗余路径的自组网密钥管理方案研究

A Redundant Paths Key Management Scheme for Ad Hoc Networks
原文传递
导出
摘要 基于部分分布式门限机制的密钥管理方案能提供高的安全性,但认证成功率较低,可扩展性差;基于证书链的密钥管理方案适合自组网的特点,但不能满足高安全要求的应用环境。在Hubaux证书链方案的基础上,文中提出了基于冗余路径的自组网密钥管理方案,该方案提高了系统的安全性,防止了不诚实节点的欺骗攻击;仿真结果表明,通过增加本地节点存储的证书数量,可以达到较高的认证成功率,满足自组网应用的高安全要求。 Key management schemes based on threshold mechanism can provide high security, but with lower certificate success rate and bad scalability; key management schemes based on certification chain satisfy self-organized features, but could not be applied in high security environment. In this paper, the redundant paths key management scheme based Hubaux scheme is proposed, which can improve the security of network and prevent dishonest attack. Simulation shows that, with the increment of local certifications, the certificate success rate can be raised, and the security needs of Ad Hoc networks satisfied.
出处 《通信技术》 2008年第11期147-149,共3页 Communications Technology
基金 国家863资助项目子项(2006AA040302-1) 重庆市教委科研项目(KJ070409)。
关键词 自组网 密钥管理 证书链 冗余路径 Ad Hoc key management certification chain redundant paths
  • 相关文献

参考文献9

  • 1Zhou L, Hass Z J. Secure ad hoc networks[J]. IEEE Networks, 1999, 13(6) :24-30.
  • 2Kong J, Zerfos P, Luo M, et al. Providing robust and ubiquitous security support for Mobile Ad-Hoc Network[C]. In Proceedings of the 9th International Conference on Network Protocols, CA USA; [s.n.] 2001:251-260
  • 3Luo H and Lu S. Ubiquitous and robust authentication services for ah hoc wireless networks. UCLA Computer Science Technical Report 200030, Oct 2000
  • 4Capkun S, Buttyan L, Hubaux J P. Self-Organized Public key Management for Mobile Ad Hoc Networks[J]. IEEE Transactions on Mobile Computing, 2003,2(01):52-64.
  • 5Hu Yih-Chun, Johnson D B, Perrig A, SEAD: Secure Efficient Distance Vector Routing for Mobile Ad Hoc Networks[C]. Fourth IEEE workshop on Mobile Computing Systems and Applications (MCSA 02), USA:Elsevier Science BY SEAD, 2003:3-13
  • 6Capkun S, Buttyan L, Hubaux J P. Self-Organized Public key Management for Mobile Ad Hoc Networks[J]. IEEE Transactions on Mobile Computing, 2003.2(01):52-64.
  • 7Hubaux J P, Buttyan L, and Capkun S. The quest for security in mobile ad hocnetworks[C]. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) NY, USA :ACM New York, 2001:146-155
  • 8Broch J, Maltz D A, Johnson D B, Hu Yih-Chun, and Jetcheva J A performance Comparsion of Multi-Hop Wireless Ad hoc Network Routing Protocol[C]. In: ACM MOBICOM, NY, USA:ACM New York, 1998: 85-97.
  • 9Canetti R, halevi S, Herzberg A. Maintaining Authenticated Communication in the Presence of Break-lns[J]. Journal of Cryptology, 2000, 13(1) :61-105.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部