期刊文献+

基于树结构的Wimax网络组密钥管理方法

Group key management method based on tree-shape architecture in Wimax network
下载PDF
导出
摘要 为了改善802.16e安全标准中组密钥管理的安全与应用性能,首先分析了常见的组密钥管理机制和Wimax无线网络的组密钥管理解决思路,利用密钥树和单向函数g,提出了一种改进的基于树结构的Wimax组密钥管理方法,设计了节点加入和离开网络时组密钥更新的过程.分析结果表明,与传统的逻辑密钥分层方案(logical key hierarchy,LKH)相比,该方法在密钥存储、密钥更新、通信量以及组管理者的计算量方面均有较好的性能.为Wimax网络的组密钥管理提供了一条有效解决思路,具有较高的实际应用价值. To improve the security and applicable capability of the group key management in 802.16e standard, the traditional group key management mechanism is discussed and the current security solutions for group key management in WiMax is analyzed. By using key tree and one-way function, an improved tree-shape group key management scheme is proposed, and the key updating process during node joining in or leaving Wimax network is also designed. Analysis result shows that, compared with the conventional method of logical key hierarchy (LKH), the proposed scheme has better performance in key storage, key updating and key calculation cost, which provides an effective solution for group key management in Wimax network and has better application value.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第A01期200-203,共4页 Journal of Southeast University:Natural Science Edition
基金 轨道交通控制与安全国家重点实验室(北京交通大学)开放课题基金资助项目(SKL2008K007) 北京电子科技学院信息安全与保密重点实验室资助项目
关键词 组密钥管理 树形结构 WIMAX 网络安全 group key management tree-shape architecture WiMax network security
  • 相关文献

参考文献9

  • 1Xu Sen, Matthews Manton, Huang Chin-Tser. Security issues in privacy and key management protocols of IEEE 802.16 [C]// Proc of the 44th Annual ACM Southeast Conference (ACMSE 2006). New York: ACM Press, 2006:113-118.
  • 2Shon Taeshik, Choi Wook. An analysis of mobile WiMAX security: vulnerabilities and solutions [C]// Proc of the 1st International Conference on Network-Based Information Systems (NBiS 2007), Lecture Notes in Computer Science. Heidelberg: Springer-Verlag, 2007, 4658: 88-97.
  • 3Wang Wei, Ma Jianfeng, Moon Temary SangJae. Tree based group key management in dynamic peer networks [C]//Proc of the 2006 International Conference on Computational Intelligence and Security. Piscataway: IEEE Computer Society, 2006: 1265-1268.
  • 4Hur Junbeom, Shim Hyeongseop, Kim Pyung, et al. Security considerations for handover schemes in mobile WiMAX networks [C]//Proc of the IEEE Wireless Communications and Networking Conference (WCNC 2008). New York: IEEE Press, 2008: 2531-2536.
  • 5Adibi Sasan, Lin Bin, Ho Pin-Han, et al. Authentication authorization and accounting (AAA) schemes in WiMAX [C]//Proc of the 2006 IEEE International Conference on Electro Information Technology. Piscataway: IEEE Computer Society, 2006: 210-215.
  • 6Wallner D M, Harder E J, Agee R C. RFC 2627 Key management for multicast: issues and architectures[S]. RFC Editor, 1999.
  • 7Wong C K, Gouda M, Lam S S. Secure group communications using key graphs [J]. IEEE/ACM Trans on Networking, 2000, 8(2): 16-31.
  • 8Balenson D, McGrew D, Sherman A. IETF Intemet draft, draft-irtf-smug-groupkeymgmt-oft-00.txt. Key management for large dynamic groups: one-way function trees and amortized initialization [S]. IETF, 2000.
  • 9Chen Yijun, Wang Yiling, Wu Xianping, et al. The design of cluster-based group key management system in wireless networks [C]//Proc of the 2006 International Conference on Communication Technology. Piscataway: IEEE Press, 2006: 1-4.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部