期刊文献+

移动Ad Hoc网络分布式CA有效性研究

Availability research of distributed CA in mobile Ad Hoc networks
下载PDF
导出
摘要 由于自组织、动态拓扑等特点,移动AdHoc网络通常由分布式CA认证模型实现网络中节点之间的认证。由于认证在安全服务中的基础地位,有效的分布式CA模型对网络有效运行的意义重大。首先分析了分布式CA的组成结构与分布式CA证书管理与私钥元管理的有效性之间的关系。然后在NS仿真平台上模拟了分布式CA证书管理的过程,实验统计结果与理论分析结论基本一致。为达到移动AdHoc网络中分布式CA较高的有效性,该结论有助于移动AdHoc网络在初始化时确定和运行过程中动态调整分布式CA的结构。 Ad Hoe network often realizes authentication between nodes by distributed Certificate Authority(CA) due to the selforganize,dynamic topology and other characteristics.The availability of distributed CA is significant for the reason that authentication is the basis of all secure services.The relation among server number,threshold and the availability in the management of certificate and secret key shares is analyzed firstly.And then an experiment,which simulates the process of the managing of certificates,is done.The experiment data are close to those computed.The conclusion is helpful to decide and adjust the structure of the distributed CA in the initializing and running state in order to achieve high availability of distributed CA service.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第10期88-90,159,共4页 Computer Engineering and Applications
关键词 AD HOC网络 信任 门限方案 分布式CA 有效性 Ad Hoc network trust threshold scheme distributed Certificate Authority(CA) availability
  • 相关文献

参考文献8

  • 1Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 1 ):612-613.
  • 2Zhou L,Haas Z.Securing ad hoc networks[J].IEEE Network,2000,13 (6):24-30.
  • 3Kong J,Zerfos P,Luo H,et al.Providing robust and ubiquitous security support for mobile ad-hoc networks[C]//International Conference on Network Protocols.Washington:IEEE Computer Society, 2001:251-261.
  • 4Ostrovsky R,Yung M.How to withstand mobile virus attacks[C]// Proc of the 10th ACM Symposium on Principles of Distributed Computing.New York:ACM Press, 1991:51-59.
  • 5Yi S,Kravets R.MOCA:Mobile certificate authority for wireless ad hoe networks[C]//IEEE Proc of 2nd Annual PKI Research Workshop Program.Maryland : Gaithersburg, 2003 : 65-79.
  • 6Elhdhili M E,Azzouz L B,Kamoun F.A totally distributed cluster based key management model for ad hoc networks[C]//The Third Annual Mediterranean Ad Hoc Networking Workshop.Bodrum (Turkey) : IEEE Computer Society, 2004: 27-30.
  • 7Lee K H,Han S B,Suh H S.Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc[C]//International Workshop on Sensor Networks,2006:321-329.
  • 8Li J H,Yu Miao.A scalable key management and clustering scheme for ad hoc networks[C]//ACM International Conference Proceeding Series,2006: 152-162.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部