期刊文献+

一种适用于Ad hoc空间网络的DPSKC密钥管理方案

Key management scheme DPSKC for Ad hoc space network
下载PDF
导出
摘要 减少为Ad hoc空间网络中新成员分发子密钥的处理时延,防止组内成员的攻击及将组内成员的子密钥泄漏给新成员。针对Ad hoc空间网络的特点,提出了一种基于椭圆曲线密码学的新型Ad hoc空间网络密钥管理方案DPSKC。设计了分布式环境下的并行子密钥计算技术和保密因子的分组传输技术,前者减少了为新成员分发子密钥的处理时延,后者可以防止组内成员的攻击以及将组内成员的子密钥泄漏给新成员。新方案在子密钥分发时延、安全性、计算和存储开销方面具有良好的性能。 To reduce the processing delay for sub-key distribution and prevent attack from the compromised users and the leaking of the sub-keys to new users, based on the characteristics of ad hoc space network, a novel scheme DPSKC for key management in ad hoc space network was proposed. Based on elliptic curve cryptography, the parallel sub-key computing technology and packet transmission for distributed environment were designed. The former technology reduced the processing delay for sub-key distribution, and the latter prevented the attack from compromised users and the leaking of the sub-keys to new user. The new scheme is secure and performs well in the sub-key distribution delay, the computation and memory consumption.
出处 《解放军理工大学学报(自然科学版)》 EI 北大核心 2009年第3期223-227,共5页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60496310)
关键词 AD hoc空间网络 分布式并行子密钥计算方案 分组传输 Ad hoe space network DPSKC(distributed parallel sub-key computing) packet transmission
  • 相关文献

参考文献8

  • 1SHEN Chien-chung,BORKAR G,RAJAGOPALAN S,et al.Interrogation-based relay routing for Ad hoc satellite networks[C].Taiwan:IEEE,Proceedings of IEEE Globecom,2002.
  • 2JIANG Li-zheng,MENG Xin,HU Sheng-bo,et al.Resarch on mobile IP routing of space network that based on IP over CCSDS[C].Qingdao:IEEE,Proceedings of the SNPD,2007.
  • 3GNAWALI O,POLYAKOV M,BOSE P,et al.Data Centric,Position-Based Routing in Space Networks[C].California:IEEE,Proceedings of the 26th Aerospace Conference,2005.
  • 4WANG K,ZHAO Z W,YAO L.An agile reconfigurable key distribution scheme in space information network[C].Harbin:IEEE,Proceedings of ICIEA,2007.
  • 5王化群,张力军,赵君喜.Ad hoc网络中基于环Z_n上椭圆曲线和RSA的密钥管理[J].通信学报,2006,27(3):1-6. 被引量:8
  • 6MENEZES A J,VAN OORSCHOT P C,VANSTONE S A.Handbook of applied cryptography[M].Florida:CRC Press,1996.
  • 7PAILIER P.Trapdooring discrete logarithms on elliptic curves over rings,advances in cryptology-ASIACRYPT00[M].Berlin:Springer-Verlag,2000.
  • 8SHI Run-hua,ZHONG Hong,HUANG Liu-sheng.A (t,n)-threshold verified multi-secret sharing scheme based on ECDLP[C].Qingdao:IEEE,Proceedings of the SNPD,2007.

二级参考文献14

  • 1刘波,李之棠.Ad hoc网络中密钥分发机制的研究[J].华中科技大学学报(自然科学版),2003,31(S1):244-246. 被引量:4
  • 2DU X J,WANG Y,GE J H,et al.A group key establishment scheme for ad hoc networks[A].Proceedings of the 17th International Conference on Advanced Information Networkings and Applications[C].Xi'an,China,2003.518-520.
  • 3KHALILI A,KATZ J,ARBAUGH W A.Toward secure key distribution in truly ad hoc networks[A].Proceedings of the 2003 Symposium on Applications and the Internet Workshops[C].Orlando,Florida,USA,2003.342-346.
  • 4LUO H,LU S.Ubiquitous and Robust Authentication Services for ad hoc Wireless Networks[R].Technical Report TR-200030,Dept of Computer Science,UCLA,2000.
  • 5ZHOU L,HAAS Z J.Securing ad hoc networks[J].IEEE Networks,1999,13(6):24-30.
  • 6PAILLIER P.Trapdooring discrete logarithms on elliptic curves over rings[A].Advances in Cryptology-ASIACRYPT'00[C].Berlin:Springer-Verlag,2000.573-584.
  • 7MENEZES A.Elliptic Curve Public Key Cryptosystems[M].Boston:Kluwer Academic Publishers,1993.
  • 8SILVERMAN J H.The Arithmetic of Elliptic Curves[M].New York:Springer-Verlag,1986.
  • 9KOYAMA K,OKAMOTO U,VANSTONE S.New public-key schemes based on elliptic curves over the ring Zn[A].Advances in Cryptology-Crypto' 91[C].Berlin:Springer-Verlag,1992.252-266.
  • 10SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部