期刊文献+

基于蓝牙Ad-hoc网络通信一种会话密钥设计

下载PDF
导出
摘要 随着社会信息化进程的加快,蓝牙作为一种低成本、短距离的无线连接开放性技术标准,应用越来越广泛。分析了蓝牙Ad-hoc网络通信及其安全机制及潜在的安全问题,同时对蓝牙Ad-hoc网络中所采用的安全策略进行了深入的研究和探讨,并提出了蓝牙Ad-hoc网络通信会话的一种密钥设计。
作者 胡国华
出处 《淮南师范学院学报》 2009年第3期34-36,共3页 Journal of Huainan Normal University
基金 合肥学院自然科研基金项目(08KY002ZR)
  • 相关文献

参考文献4

二级参考文献28

  • 1l Chlamtac, M Conti, et al. Mobile Ad hoc Networking: Imperatives and Challenges[J]. Ad hoc Net works, 2003,1(1) :13-64.
  • 2Luis F G Sarmenta. Sabotage-tolerance Mechanism for Volunteer Computing Systems [ J ]. Future Generation Computer Systems, 2002,18(4) :561-572.
  • 3C Perkins. Highly Dynamic Destination-Sequenced Distance-Vector routing ( DSDV ) for Mobile Computers [ C ]. Proceedings of SIGCOMM, 1994.
  • 4S Murthy, et al. An Efficient Routing Protocol for Wireless Networks[ J ]. Mobile Networks and Applications, 1996,1 ( 2 ) : 183-197.
  • 5C E Perkins, E M Royer. Ad hoc On-demand Distance Vector Routing[J]. IEEE Workshop on Mobile Computing Systems and Applications, 1999,(2) :90-100.
  • 6D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[ C]. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1994, ( 12 ) : 158-163.
  • 7K Sanzgiri, B Dahill, et al. A Secure Routing Protocol for Ad hoc Networks [ C ]. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002. 1-10.
  • 8Hongmei Deng,et al. Routing Security in Wireless Ad hoc Networks[J]. IEEE Communications Magazine,2002, (10) :70-75.
  • 9C1 Karlof, D Wager. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [ J ]. Ad hoe Networks, 2003, ( 1 ) :293-315.
  • 10Miller B P, et al. A Re-examination of the Reliability of UNIX Utilities and Services[ R]. Department of Computer Science, University of Wisconsin,1995. 1-30.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部