期刊文献+

基于Diffie-Hellman的移动Ad hoc网络动态混合密钥管理策略

Dynamic hybrid key management strategy for mobile Ad hoc networks based on Diffie-Hellman theory
下载PDF
导出
摘要 密钥管理是解决移动Ad hoc网络中安全通信问题的重要环节。在分析网络特点的基础上,提出了一种基于Diffie-Hellman协议的动态混合密钥管理策略(DHKM)。通过网络分簇,将多个簇首节点一起作为权威机构执行管理功能,采用Diffie-Hellman交换,并利用成员过滤函数维护密钥,适应网络拓扑的动态变化。结果表明,DHKM保证了密钥的完整性和机密性,并有效减少了密钥更新对网络性能的影响。 Secure communication is very important in Ad hoc networks and key management is one of most eminent things in security quality. This paper presented a cluster-based dynamic hybrid key management(DHKM) solution, based on the theory of Diffie-Hellman. After dynamically clustering the mobile nodes distributed randomly, these clusterheads jointly executed administrative functions relying on Diffie-Hellman protocol. Utilized member filter function to maintain key management, which accommodated to topological dynamic change. It concludes that DHKM model ensures integrity, confidentiality and adapts to the special requirements for frequent key refresh.
出处 《计算机应用研究》 CSCD 北大核心 2008年第12期3732-3734,共3页 Application Research of Computers
基金 国家博士点基金资助项目(20030290003) 河南理工大学自然科学(青年)基金资助项目(646138)
关键词 移动自组化网络 密钥管理 动态混合 成员过滤函数 mobile Ad hoe networks key management dynamic hybrid member filter function
  • 相关文献

参考文献12

  • 1MICHAE ST, CENE T, MZCHAEL W. Diffie-Hellman key distribution extended to group communication [ C ]//Proc of the 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996:31-37.
  • 2ZHOU Li-dong, HAAS Z J. Securing Ad hoc networks [ J]. IEEE Network, 1999,13 (6) :24-30.
  • 3OTHMAN J B, XUE Xiao-yan. Security equipment in Ad hoc networks[ C ]//Proc of the 55th Vehicular Technology Conference. 2002:1819-1823.
  • 4BURMESTER M, DESMEDT Y. A secure and efficient conference key distribution system [ C ]//Proc of Cryptology-EUROCRYPT' 94. Berlin : Springer-Verlag, 1994 : 275- 286.
  • 5傅坚,张翎.无线Ad hoc网动态密钥管理问题的研究[J].电子与信息学报,2006,28(5):815-819. 被引量:3
  • 6李昕,刘建辉,成诚,孟祥幅.基于PKI的P2P信任关系[J].辽宁工程技术大学学报(自然科学版),2007,26(3):412-414. 被引量:2
  • 7许力,钱晓聪.移动自组网环境下基于图论的智能优化分簇策略[C]//2005年中国计算机大会论文集.北京:清华大学出版社,2005:10.
  • 8BECHLER M, HOF H J, KREFT D, et al. A cluster-based security architecture for Ad hoc networks[ C ]//Proc of IEEE INFOCOM'04. Washington DC : IEEE Computer Society, 2004:2393-2403.
  • 9SEUNCI-IUN J, CHANIL P, DAESEON C, et al. Cluster-based trust evaluation scheme in Ad hoc network [ J ]. ETRL Journal,2005,27 (4) :465-468.
  • 10LI Xiang-yang, WANG Yu, FRIEDER O. Efficient hybrid key agree- ment protocol for wireless Ad hoc networks [ C ]//Proc of the 11 th International Conference on Conputer Communications and Networks. 2002:404-409.

二级参考文献18

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部