期刊文献+

基于Ad hoc网络的一种分层组密钥管理方案

下载PDF
导出
摘要 通过深入分析有线网络组密钥管理方案,结合无线网络的特点,提出一种基于Adhoc网络的分层组密钥管理方案。该方案具有两层管理结构,将密钥更新限制在各簇内,可以提高更新效率,减小系统开销。通过与逻辑密钥树方案在通信开销等方面的对比,证明此方案更加有效。
作者 郭丽
出处 《安徽电子信息职业技术学院学报》 2009年第6期7-8,83,共3页 Journal of Anhui Vocational College of Electronics & Information Technology
  • 相关文献

参考文献8

  • 1Deuk-Whee Kwak, SeungJoo Lee, JongWon Kim, Eunjin Jung. An Efficient LKH Tree Balancing Algorithm for Group Key Management [C]. IEEE COMMUNICATIONS LETTERS,2006,10(3):222-224.
  • 2Mittra S. A Framework for scalable secure Muhicasting [C]. Proceedings of ACM SIGCOMM'97,1997:277-288.
  • 3朱文涛,熊继平,李津生,洪佩琳.安全组播中密钥分配问题的研究[J].软件学报,2003,14(12):2052-2059. 被引量:18
  • 4徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 5Ateniese G, Steiner M,Tsudik G. New multi-party authentication services and key agreement protocols[J]. IEEE JSAC, 2000, 18(4):628- 639.
  • 6Y.Sun,W.Trappe,and K. J. R. Liu. An Efficient Key Management Scheme for Secure Wireless Muhicast[C]. presented at IEEE International Conference on Communication, 2002:1236-1240.
  • 7Y.Kim,A.Perrig, and G.Tsudik,Tree-based Group Key Agreement[J].ACM on information and system security, 2004,7(1): 60--96.
  • 8Ossaiiia Younis and Sonia Fahmy,Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid,Energy- Efficient Approach [M]. in Proceeding of IEEE INFOCOM, 2004:629-640.

二级参考文献32

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部