期刊文献+

MIPv6中基于身份的安全路由优化 被引量:9

ID-based Security Routing Optimization in Mobile IPv6
下载PDF
导出
摘要 MIPv6是IPv6协议体系的必选扩展。针对路由优化的安全问题,对MIPv6的多种安全路由优化模式进行分析,介绍身份签名算法,提出基于身份认证的路由优化协议,并阐述路由优化过程,实现节点的外地链路的身份认证,消除协议对于公钥证书或者认证中心的依赖,从而减少MN因获得和维护公钥证书产生的时延,保证路由优化的安全性。 Routing optimization provides the MIPv6 opportunity to improve the network performance. This paper proposes a routing optimization mechanism which applies the ID signature to make the identity of mobile nodes verified by the correspond nodes communicating. New protocol eliminates the certification authority dependence, and secures mobile nodes and correspond nodes from the attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第9期127-129,共3页 Computer Engineering
基金 国防科工委应用基础基金资助项目 南京理工大学研究生创新基金资助项目(2007060005)
关键词 移动IPV6 安全 路由优化 基于身份 Mobile IPv6(MIPvr) security routing optimization ID-based
  • 相关文献

参考文献4

  • 1Johnson D.Perkins C.Mobile support in IPv6[S].RFC 3775,2004.
  • 2Arkko J,Vogt C,Haddad W.Enhanced Rout Optimization for Mobile IPv6[S].RFC 4866,2007.
  • 3Ren Kui,Lou Wenjing.Routing Optimization security in Mobile IPv6[J].Computer Network,2006,50(1):2401-2419.
  • 4田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16

二级参考文献42

  • 1L C Guillou,J J Quisquater.A "paradoxical" identity-based signature scheme resulting from zero-knowledge[G].In:Advances in Cryptology-Crypto'88,LNCS 403.Berlin:Springer-Verlag,1990.216-231
  • 2U Fiege,A Fiat,A Shamir.Zero-knowledge proofs of identity[J].Journal of Cryptology,1998,1(2):77-94
  • 3C Cocks.An identity based encryption scheme based on quadratic residues[G].In:Proc of the IMA Int'l Conf on Cryptography and Coding,LNCS 2260.Berlin:Springer-Verlag,2001.360-363
  • 4D Boneh,M Franklin.Identity-based encryption from the Weil pairing[G].In:Advances in Cryptology-Crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001.213-229
  • 5B Lynn.Authenticated ID-based encryption[R].Cryptology ePrint Archive,Tech Rep:2002/072,2004.http://eprint.iacr.org/ 2002/072
  • 6R Canetti,S Halevi,J Katz.Chosen-ciphertext security from identity based encryption[G].In:Advances in Cryptology-Eurocrypt'04,LNCS 3027.Berlin:Springer-Verlag,2004.207-222
  • 7D Boneh,X Boyen.Efficient selective ID secure identity based encryption without random Oracles[G].In:Advances in Cryptology-Eurocrypt'04,LNCS 3027.Berlin:Springer-Verlag,2004.223-238
  • 8D Boneh,X Boyen.Secure identity based encryption without random oracles[G].In:Advances in Cryptology-Crypto'04,LNCS 3152.Berlin:Springer-Verlag,2004.443-459
  • 9B Waters.Efficient identity-based encryption without random Oracles[G].In:Advances in Cryptology-Eurocrypt'05,LNCS 3494.Berlin:Springer-Verlag,2005.114-127
  • 10J Horwitz,B Lynn.Toward hierarchical identity-based encryption[G].In:Advances in Cryptology-Eurocrypt'02,LNCS 2332.Berlin:Springer-Verlag,2002.466-481

共引文献15

同被引文献79

引证文献9

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部