期刊文献+

具有自我恢复功能的密钥管理方法在MANET网络中应用研究 被引量:1

Research of the Self-healing Key Management in MANET
下载PDF
导出
摘要 针对MANET网络动态拓扑和节点处理能力弱等特征,提出了适合MANET网络环境并利用密钥的上下文来恢复网络密钥的密钥管理方法,有效地降低了系统通信量;给出了一个安全有效的密钥分配模型,该模型在占用内存和减少运算复杂性方面都具有非常明显的优势;分析结果表明该方案在安全性方面具有明显优势,分析验证了该算法在MANET网络中使用的有效性和可行性. A self-healing key management method by using the context of the message according to the dynamic topology and low process ability of MANET is proposed in the paper, which can reduce the system communications overhead;it also offers an efficient key distribution method to reduce the memory and computation overhead compared with the common self-healing key management protocol. ;the paper analyzed the research results verified the secure predominance, efficiency and availability to MANET.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第4期889-893,共5页 Acta Electronica Sinica
基金 国家自然科学基金重点项目(No.60236010) 部委重点基金项目(No.6140445) 国家高校优秀青年教师教学与科研奖励计划
关键词 MANET 自我恢复 密钥管理 自组织 MANET Self-healing Key management Self-organize
  • 相关文献

参考文献21

  • 1V Karpijoki. Security in ad hoe networks [ A]. Tik-110. 501 Seminar on Network Security [C].HUT TML,2000.
  • 2S Marti, T Giuli, K Lai, M Baker. Mitigating routing misbehaviour in mobile ad-hoc networks [ A ]. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking [ C] .New York, NY, USA: ACM,2000.255 - 265.
  • 3H Luo, S Lu. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks [ R]. Technical report UCLACSD-TR-200030, October 2000.
  • 4Y Kim, A Perrig, G Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups [ A]. S Jajodin, P Samarati (eds). Proceedings of the 7th ACM Conference on Computer and Communications Security [ C ]. New York: ACM,2000,235 - 241.
  • 5M J Moyer, J R Rao, P Rohatgi. A survey of securely issues in multicast compunctions[ J]. IEEE. Network, 1999,13(6) : 12- 23.
  • 6RFC 2627, Key Management for Multicast: Issues and Architectures[S] .Internet Draft Report. Sept. 1998.
  • 7R Canetti, J Garay, G Itkis, D Miccianancio, M Naor, K Pinkas. Multicast security: a taxonomy and some efficient constructions [ A]. Proceedings of Eighteenth Annual Joint Conference of the IEEE. Computer and Communications Societies [C]. 1999, vol. 2,708 - 716.
  • 8Zhou L, Z Haas. Securing ad-hoc networks [ J]. IEEE Network Magazine, 1999,13(6) :24 - 30.
  • 9S Yi, P Naldurg, R Kravets. Security-aware ad-hoc routing for wireless networks [ A]. Proceedings of the Symposium on Mobile Ad Hoc Networking and Computing [ C]. ACM,2001,299 - 302.
  • 10H Luo,S Lu.URSA:Ubiquitous and robust access control for mobile ad-hoc networks [ J]. IEEE-ACM Transactions on Networking, 2004,12(6) : 1049 - 1063.

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部