期刊文献+

Sead协议哈希链机制的分析与改进

Analysis and Improvement of Hash Chain Mechanism of Sead Protocol
原文传递
导出
摘要 由于ADHOC网络是一种特殊的无线网络,其路由安全性显得尤为重要。文中深入研究了ADHOC网络中安全路由协议sead,对其中的哈希链保护机制进行了深入的分析,包括哈希链中链值的传播,哈希链值在节点间的验证机制。在对sead协议哈希链机制深入分析的基础上,发现其重新生成新链后所带来的哈希链过长以及其链值利用率低的问题,并提出了一个解决方案,节省了资源空间,提高了资源利用率。 As Ad Hoc network is aspecial wireless networks, this routing security seems to be quite important. This paper deeply studies sead protocol designed for Ad hoc networks, and analyzes thoroughly its hash chain mechanism, including transmission and verification of hash chain elements between different mobile nodes. Based on the deep analysis of the hash chain mechanism, some problems are found, such as that the new hash chain is too long and the utilization rate of hash chain elemnts is too low after generating a new hash chain. Thus a solution to the problems is given, which could save resources and improve the utilization rate.
出处 《信息安全与通信保密》 2009年第8期196-199,共4页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(60773041) 江苏省自然科学基金资助项目(BK2008451) 国家高科技863基金资助项目(2007AA012404、2007AA012478):现代通信国家重点实验室基金资助项目(9140C1105040805) 江苏省高校自然科学研究计划(07KJB520083) 江苏塑博士后基金(0001019C):江苏高校科技创新计划项目 (CX08B085Z、CX08B-086Z)和江苏省六大高峰人才项目资助.
关键词 无线自组网 sead协议 安全路由 哈希链 ad hoc sead protocol secure routing hash chain
  • 相关文献

参考文献6

  • 1刘培超,杨浩,周熙.一种移动Ad Hoc网络的安全路由认证系统[J].通信技术,2008,41(11):160-162. 被引量:2
  • 2Hu Yih-Chun, Johnson D B, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks [J]. Ad Hoc Networks, 2003, 1(01): 175-192.
  • 3Perkins C E, Bhagwat P. Highly Dynamic Destination Sequenced Distance-Vector Routing(DSDV) for Mobile Computers [C]//IEEE. In Proceedinds of SIGCOMM ' 94 Conference on Communications Architectures, Protocols ans Applications. London, United kingdom: ACM, 1994:234-244.
  • 4李志远.一种改进的无线自组网DSR路由协议[J].通信技术,2008,41(6):11-13. 被引量:1
  • 5张浩军,祝跃飞.一种可自更新Hash链机制[J].武汉大学学报(理学版),2006,52(5):596-599. 被引量:5
  • 6Lin Chun-Hsing, Lai Wei Shen, HuangYen Lin, et al. 1-SEAD:A Secure Routing Protocol for Mobile Ad Hoc Networks [C]//IEEE. 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. Busan:[s.n.],2008:102 107.

二级参考文献18

  • 1陈书义,王翠荣,赵宏.基于ECC的移动Ad hoc网络安全路由算法[J].东北大学学报(自然科学版),2006,27(6):646-649. 被引量:1
  • 2张绪辉,罗忠.Ad Hoc网络的安全策略[J].湖北教育学院学报,2007,24(2):88-90. 被引量:3
  • 3Johnson David B, Maltz David A, Hu Yih-Chun. The Dynamic Source Routing for Mobile Ad Hoc Networks [DB/OL]. ftp://ftp, rfceditor, org/in-notes/rfc4728, txt, 2007.2/2008.1
  • 4Young-Bae Ko, Nitin H. Vaidya. Location-Aided Routing (LAR) in mobile ad hoc networks[DB/OL].bttp://courses, csail, mit. edu/ 6.885/spring06/papers/KoVaidya-wireless. pdf, 2008.1.
  • 5Lidong Zhou, Zygmunt Haas. Securing ad hoc networks[J]. IEEE Network Magazine, Special Issue on Networking Security. 1999, 13(6) :24-30.
  • 6Hailer N,Metz C, Nesser P,et al. A OneTime Password System. (RFC 2289) [DB/OL]. [2005-10-09].http ://www. ietf . org.
  • 7Ramkumar M, Memon N. An Efficient Key Pre-distribution Scheme for MANET Security [J]. IEEE Journal on Selected Areas of Communication , 2005,13 (3) :611-621.
  • 8Patil V, Shyamasundar R K. An Efficient, Secure and Delegable Micro-Payment System [J]. Information Systems Frontiers, 2005,7(4-5 ):371-389.
  • 9张浩军,祝跃飞.无线局域网认证基础架构研究与设计[C]//第11届全国青年通信学术会议.北京:北京邮电大学出版社,2006:913—918.
  • 10Deng J, Han R, Mishra S. Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks[C]//Proceedings of the Fifth International Conference on Information Processing in Sensor Networks(1PSN' 06). New York, NY, USA: ACM Press,2006:292-300.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部