期刊文献+

具有前向安全的Ad Hoc密钥管理方案

Scheme of Key Management in Ad Hoc Network with Forward Security
下载PDF
导出
摘要 在完全分布式CA模型的基础上,结合信任度动态评估策略,提出了一种具有前向安全的密钥管理方案。使用NS-2仿真软件进行仿真实验,结果表明,当网络中节点数目的不同时,节点的认证成功率和节点延迟均保持稳定,提高了Ad Hoc网络的安全性与可用性,降低了系统开销。 On the basis of the fully distributed CA model, and combined the value of trust in dynamic assessment strategy, a scheme of key management in Ad Hoc network with forward security was proposed. Simulation results of NS-2 show that the success rate of certification and the certification detention for the different number of the network node are keep stable, and the availability of the Ad Hoc network is improved, and the system overhead is reduced.
出处 《青岛大学学报(自然科学版)》 CAS 2009年第4期72-76,共5页 Journal of Qingdao University(Natural Science Edition)
关键词 AD HOC网络 前向安全性 密钥管理 完全分布式 Ad Hoc network forward security key management fully distributed
  • 相关文献

参考文献4

二级参考文献22

  • 1王少辉,王美琴,张睿超,潘景山,王春梅.Adhoc网络密钥生成管理方案综述与分析[J].计算机应用研究,2004,21(10):9-11. 被引量:3
  • 2Zhou Lidong, Zygmunt JHaas. Securing Ad hoc networks[J]. IEEE Network Magazine, 1999,13(6): 24-30.
  • 3Boneh D, Shacham H, Lynn B. Short signatures from the Well pairing[A]. In C. Boyd, editor, Advances in Cryptology- ASIACRYPT 2001[C], volume 2248 of Lecture Notes in Computer Science, Springer-Yerlag, 2001:514-532.
  • 4Shamir A. Identity-based cryptosystems and signature schemes[A]. In G.R. Blakley and D. Chaum, editors, Advances in Cryptology-Proceedings of CRYPTO' 84[C], Springer-Verlag LNCS 196, 1985:47-53.
  • 5Beth T, Borcherding M, Klein B. Valuation of trust in open network[C]. Proc European Sysposium on Research in Securit (yES-ORICS) .Brighton: Springer- Verlag, 1994: 3-18.
  • 6ZHOU L, HAAS Z J. Securing Ad hoc networks [J]. IEEE Network, 1999, 13(6):24-30.
  • 7SHAMIR A. How to share a secret[J]. ACM Comm, 1979, 22 (11) :612-613.
  • 8BECHLER M, HOF H, KRAFT D, et al. A clutter-based security architecture for Ad hoe networks [ C ] //Proc of the 23 rd Annual Joint Conference of the IEEE Computer and Communications Society. Hong Kong: [ s. n. ] ,2004.
  • 9HUBAUX J, BUTTYAN L, CAPKUN S. The quest for security in mobile Ad hoc networks[ C] //Proc of the 2nd ACM Symp on Mobile Ad hoc Networking and Computing. New York: ACM Press, 2001: 146-155.
  • 10CHANDRA J, SINGH L L. A cluster based security model for mobile Ad hoc networks [ C ] //Proc of Personal IEEE International Conference on Wireless Communications. 2005:413-416.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部