期刊文献+

基于门限完全分布式密钥管理方案 被引量:1

Fully-Distributed Key Management Scheme Based on Threshold
下载PDF
导出
摘要 ad hoc网络作为一种无线移动网络正成为网络研究中的热点之一。针对移动ad hoc网络的特性和对目前已有的移动ad hoc网络密钥管理方案的分析,提出了一种基于信任图和门限密码技术的全分布、自组织的移动ad hoc网络密钥管理新方案。该方案允许节点发布公钥证书并且通过证书链实施认证,有效地解决了网络节点之间的信任,同时又阻止恶意节点发布错误公钥证书欺骗认证服务。该方案具有较高的可靠性、扩展性和安全性,适用于大规模移动ad hoc网络。 The ad hoc networks is turning to he a hotspot of research. For mobile ad hoc network characteristics and available mobile ad hoc network analysis of key management scheme currently, proposed a fully distribution, self- organizing new key management scheme for mobile ad hoc networks based on trust graphs and threshold cryptography. It permits nodes to issue public key certificates and to perform authentication via certificates' chains. It is an effective solution to the trust between network nodes, in which prevent malicious nodes from issuing false certification to deceive certification services. It has higher reliabilty, extensibility ,security, applies to the large scale mobile ad hoc network.
出处 《计算机技术与发展》 2010年第2期175-177,181,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(10671056)
关键词 ad HOC网络 密钥管理 全分布 自组织 sd hoe network key management fully distribution self-organization
  • 相关文献

参考文献8

  • 1Perkins C E. Ad Hoc Networking[M]. [s. l. ] : Addison Wesley Professional,2000.
  • 2Deng H, Li W, Agrawal D P. Routing security in wireless ad hoc networks[ J ]. IEEE Communications Magazine, 2002,40 (10):70- 75.
  • 3Zhou L, Haas Z. Securing ad hoc networks[J]. IEEE Net, 1999,6(13) :24 - 30.
  • 4Seung Yi, Kravets R. Moca: mobile certificate authority for wireless ad hoc networks[C] //In Proceedings of 2nd annual PKI research workshop (PKI03). Gaithersburg, MD, USA: [s. n. ] ,2003.
  • 5Y, Liu W, Lou W, et al. Securing mobile ad hoe networks with eerticateless public keys[J]. IEEE Tram Dependable Secure Comput,2006,3(4) :386 - 399.
  • 6Capkun S, Buttyan L, Hubaux J. Self - organized publickey management for mobile ad hoe networks[ J ]. IEEE Trans Mobile Comput,2003,2 ( 1 ) : 52 - 64.
  • 7Capkun S, Buttyan L, Hubaux J. Small worlds in security systems:an analysis of the PGP certifi cate graph[C]//In Proceedings of the 2002 workshop on New security paradigms. [s. l. ] :ACM Press,2002:28 - 35.
  • 8Ren K, Li T, Wan Z, et al. Highly reliable trust establishment scheme in ad hoe networks [ M ]. [s. l. ]: Elsevier, 2004.

同被引文献5

  • 1Song B, Kim K. Two-pass authenticated key agreement protocol with key confirmation. 2000:237 - 249.
  • 2闰鸿滨.密钥托管系统的研究与设计[D].成都:四川师范大学,2006.
  • 3Hoffstein J,Pipher J, Silveman J H. NTRU.A Ring Based Public Key Cryptosystem [ C ]//Proc, Algorithmic Number Theory: Third Int'l Symq. ( ANTS 3 ). 1998:267 -288.
  • 4贺营.NTRU公钥密码体制研究及其在WLAN中的应用设计[D].成都:西南交通大学,2006.
  • 5孙树峰,贺樑,石兴方,顾君忠.802.11无线局域网安全技术研究[J].计算机工程与应用,2003,39(7):40-42. 被引量:11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部