期刊文献+

无线移动Adhoc网络安全认证机制研究 被引量:1

Security and Authentication Mechanism Research for Mobile Ad hoc Network
下载PDF
导出
摘要 在探究无线移动Adhoc网络中以门限机制为基础的分布式CA安全认证机制的优势与缺陷的基础上,分析研究了整合身份与门限机制的分布式无线移动Ad-hoc网络密钥管理模型。该模型以基于身份的加密签名机制为基础,结合基于Lagrange插值的门限秘密共享方案,适应于无线移动Ad-hoc网络环境中拓扑变化、资源有限等特点,可以实现安全高效的无线移动Ad-hoc网络认证系统。 Traditional security authentication mechanism such as PKI is no longer applicable to Mobile Ad-hoc NETwork (MANET), and therefore the distributed CA based on threshold secret sharing mechanism is introduced into MANET. After discussion of the distributed CA's advantages and disadvantages, A detail analyses is given to a MANET distributed key management model integrated both identity cryptography and threshold mechanism based on Lagrange interpolation. The analysis shows that the model is capable to realize a wonderful MANET security authentication system with high efficiency.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第S3期1437-1440,共4页 Journal of University of Electronic Science and Technology of China
关键词 ADHOC网络 密钥管理 基于身份 安全认证 门限 Ad hoc network key management identity-based security authentication threshold
  • 相关文献

参考文献12

  • 1徐倩,张福泰,刘志高.无线Ad hoc网络中基于身份的密钥管理方案[J].南京师范大学学报(工程技术版),2006,6(3):56-61. 被引量:4
  • 2陈炜,龙翔,高小鹏.一种基于身份的移动自组网认证机制[J].北京航空航天大学学报,2006,32(7):869-872. 被引量:4
  • 3KONG J,ZERFOS P,LUO H Y,et al.Providing robust and ubiquitous security support for mobile Ad-Hoc networks. Proceedings of the IEEE9th International Conference on Network Protocols(ICNP‘01) . 2001
  • 4BONEH D,FRANKLIN M.Identity-based encryption from weil pairing. Lecture Notes in Computer Science . 2001
  • 5SCOTT M.Faster identity based encryption. Electronics Letters . 2004
  • 6HESS F.Exponent group signature schemes and efficient identity based signature schemes based on pairing. Lecture Notes in Computer Science . 2003
  • 7PATERSON K.ID-based signatures from pairing on elliptic curves. http://eprint.iacr.org . 2007
  • 8KHALILI A,KATZ J,ARBAUGH W A.Toward secure key distribution in truly Ad-Hoc networks. Proceedings of The Symposium on Applications and the Internet Workshops . 2003
  • 9DENG H,MUKHERJEE A,AGRAWAL D P.Threshold and identity-based key management and authentication for wireless Ad hoc networks. Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC’2004) . 2004
  • 10SHAMIR A.How to share a secret. Communications of the ACM . 1979

二级参考文献25

  • 1[1]SHMIR A.Identity-based cryptosystems and signature schemes[C]// Proc of Cryptology-Crypto 84.CA:Springer-Verlag,1984:47-53.
  • 2[2]KHALILIi A,KATZ J.Toward secure key distribution in truly Ad-Hoc networks[C] //Proc of The Symposium on Applications and the Internet Workshops,Berlin:Springer-Verlag,2003:342-346.
  • 3[3]DENG H,MUKHERJEE A,AGRAWAL D P.Threshold and identity-based key management and authentication for wireless Ad Hoc networks[C]//Proc of IEEE International Conferences on Information Technology (ITCC04).2004:107-110.
  • 4[4]PEDERSEN T.A threshold cryptosystem without a trusted party[J].Computer Science.Berlin:Springer-Verlag,1991,547(10):522 -526.
  • 5[5]FELDMAN P.A practical scheme for non-interactive verifiable secret sharing[C]//Proc of 28th IEEE Symposium on Foundations of Computer Science.Berlin:Springer-Verlag,1987:427-437.
  • 6[6]SUI A f,SHERMAN S M,LUCAS C K,et al.Secure and anonymous identity-based key Issuing without secure channel[EB/OL].http://eprint.iacr.org,November,2004.(20-11-2004)[30-11-2004]
  • 7[7]BONEH D,FRANKLIN M.Identity-baesd encryption from the weil pairing[C]//Proc of Crypto 2001.CA:Springer-Verlag,2001:213-229.
  • 8[8]HESS F.Exponent group signature schemes and efficient identity based signature schemes based on pairing[EB/OL].http://eprint.iacr.org,2002.(4-1 -2002)[22-1 -2002]
  • 9[9]PATERSON K.ID-based signatures from pairing on elliptic curves[EB/OL].http://epring.iacr.org,2002.
  • 10[10]SHAMIR A.How to share a secret[J].ACM Communications.1979,22 (11):612-613.

共引文献6

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部