期刊文献+

引入权重的Ad Hoc网络身份认证簇接入模型 被引量:1

An Improved Authentication Cluster Control Model in Ad Hoc Network
下载PDF
导出
摘要 在研究原有的基于身份认证的簇接入模型的基础上,结合shamir门限方案和权重理论,提出了一个改进的Ad Hoc网络身份认证簇接入模型。该模型结合实际情况对簇中的所有成员节点赋予对应的权重值,任意成员节点在认证过程中享有不同的认证地位。即使簇中成员节点数量减少,新节点只要获得t份以上的部分成员身份证书和部分共享密钥仍然能够完成认证,计算自己的身份证书和共享密钥。 The paper studys an intrinsic authentication cluster control model, then an improved authentication cluster control model based on threshold scheme of shamir and the weight theory was presented. The model endows with weighed value to all member nodes in the cluster, any node takes different authentication status. Even though member nodes have reduced, the model do the authenticating if new node could receive more than t share of part member identity certificate and part shared key, then calculate its identity certificate and shared key.
作者 陈涛 周学广
出处 《计算机与数字工程》 2009年第10期104-106,167,共4页 Computer & Digital Engineering
关键词 AD HOC网络 权重 身份认证 ad hoc network cluster weighed identity-based authentication
  • 相关文献

参考文献9

  • 1ELHDHII.I M E, AZZOU L B, KAMOUN F. A totally distributed cluster based key management model for ad hoc networks[C]. The Third Annual Mediterranean Ad Hoc Networking Workshop. Bodrum, Turkey: IEEE Computer Society, 2004 : 27-30.
  • 2BECHLER M, HOF H J, KRAFT D, et al. A cluster-based security architecture for ad hoc networks[C]. In: 23rd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM'04), Hongkong, 2004:2393-2403.
  • 3Liu K, Li J D. Mobile cluster protocol in wireless Ad Hoc networks[C]. Communication Technology Conference, Beijing, China, 2000 : 568-573.
  • 4冯永新,王光兴,刘治国,姜月秋.一个应用于移动Ad Hoc网络管理的簇生成算法[J].软件学报,2003,14(1):132-138. 被引量:19
  • 5程伟明,周新运,盛凌志.一个基于层次结构的Adhoc网络移动模式[J].通信学报,2004,25(2):131-137. 被引量:7
  • 6A Shamir How to Share a Secret[C]. Communication of ACM, 1979.
  • 7Nitesh Saxena. Gene Tsudik. Identity-Based Access Control for Ad Hoc Groups[C]. Springer-Verlag Berlin Heidelberg, 2005 : 362- 379.
  • 8J Kong P Zerfos, H Luo, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks[C]. Proc 9th Int'lConf Network Protocols(ICNP), 2001.
  • 9ZHOU L, HASS ZJ. Securing Ad Hoc Nelworks [J]. IEEE Network, 1999,13(6) : 24-29.

二级参考文献8

  • 1[1]Corson S, Macker J. Mobile Ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. RFC 2501, 1999.
  • 2[2]Chen W, Jain N, Singh S. ANMP: Ad hoc network management protocol. IEEE Journal on Selected Areas in Communications, 1999,17(8):1506~1531.
  • 3[3]Lindfors AK. Policy based management in Ad-hoc networks. In: Proceedings of the Helsinki University of Technology Seminar on Internetworking. 2000. http://www.tml.hut.fi/Opinnot/Tik-110.551/2000/papers/.
  • 4[4]Sharony J. An architecture for mobile radio networks with dynamically changing topology using virtual subnets. Mobile Networks and Application (MONET), 1996,1(1):75~86.
  • 5[5]Sánchez R, Evans J, Minden G. Networking on the battlefield: challenges in highly dynamic multi-hop wireless networks. In: Proceedings of the IEEE 1999 Military Communications Conference (MILCOM'99). 1999. http://www.argreenhouse.com/society/ TacCom/milcom_99_papers.shtml.
  • 6[6]Goldszmidt G, Yemini Y. Delegated agents for network management. IEEE Transactions on Communication, 1998,36(1):66~70.
  • 7卜月华等主编图论及其应用[M].
  • 8Mario Gerla,Jack Tzu-Chieh Tsai. Multicluster, mobile, multimedia radio network[J] 1995,Wireless Networks(3):255~265

共引文献24

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部