期刊文献+

一种基于TPM增强的ARAN安全路由协议 被引量:1

Enhanced Secure Routing Protocol Based on TPM
下载PDF
导出
摘要 安全路由协议设计是Adhoc网络安全研究的重要组成部分。当前研究主要集中在采用经典密码学中的方法来保证路由安全。结合可信计算中的TPM和典型的安全路由协议ARAN,提出了一种新的安全路由协议TEA-RAN,该协议不再采用集中式的公钥证书分发中心PKI,而是采用TPM中的DAA(Directed Anonymous Attestation)方式来进行节点的身份认证,以及软安全中可信阈值来监测邻居节点的行为,从而进行公钥可信分发,同时确保了无恶意节点加入网络,另外,也采用公钥签名、会话密钥加密来保证端到端通信的保密性、完整性和不可否认性。理论证明了提出的TEARAN协议能够实现网络的匿名安全,防范当前常见的攻击方式,达到了很好的安全保证效果。 The design of secure routing protocol is one of an important part of research on network security for Ad hoc networks.At present,the research mainly focuses on means of classic cryptograph to guarantee security of routing.Integrating TPM of trusted computing and typical secure routing protocol-ARAN,this paper proposed a new secure protocol called TEARAN,this protocol doesn't adopt the way of the centralized public key certificate issued center-PKI,but utilizes the technique of DAA in TPM to authenticate the identity of each node,and employs the trust threshold of soft security to monitor the behavior of neighbor nodes,so that attaining the purpose of the trust-distributed public key,in addition,avoiding malicious nodes joining in the network.This paper also assured the end to end confidentiality,integrity and non-repudiation.By theoretical analysis on the proposed TEARAN was presented to satisfy the demand of anonymous security,resist conventional malicious attacks and possess better security in effect.
出处 《计算机科学》 CSCD 北大核心 2010年第11期55-58,74,共5页 Computer Science
基金 国家自然科学基金重点项目(60633020)资助
关键词 TPM 安全路由 可信 匿名 ADHOC网络 TPM Secure routing Trust Anonymity Ad hoc networks
  • 相关文献

参考文献1

二级参考文献19

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4Department of Defense Computer Security Center.DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA:DOD, December 1985.
  • 5Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/ groups/ TCG_1_0_Architecture_Overview.pdf.
  • 6Intel Corporation. LaGrande Technology Architectural Overview [EB/OL].[2005-05-01]. http://www.intel.com/technology/security/.
  • 7Patel J,Teacy W T, Luke,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources[C]//Trust Management, Third International Conference, iTrust 2005. Berlin Heidelberg: Springer,2005 : 193-209.
  • 8Beth T, Borcherding M, Klein B. Valuation of Trustin Open Network[C]// Proc of the European Symposium on Research in Security (ESORICS). Brighton:Springer-Verlag, 1994 : 3-18.
  • 9Audun J. An Algebra for Assessing Trust in Certification Chains[C]// Proc of NDSS ' 99, Network and Distributed System Security Symposium. San Diego,California, USA, February 1999.
  • 10Pearson S. Trusted Computing Platform, the Next Security Solution[R]. Bristol UK: HP Laboratories,2002.

共引文献113

同被引文献30

  • 1吴启武,刘青子.基于贝叶斯理论的VANET安全路由信任模型[J].四川大学学报(工程科学版),2015,47(2):129-135. 被引量:12
  • 2张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 3Mejri M N, Ben -Othman J, Hamdi M. Survey on VANET security challenges and possible cryp- tographic solutions [ J ]. Vehicular Communica- tions, 2014, 1(2):53 -66.
  • 4Zeadally S, Hunt R, Chen Y S, et al. Vehicular ad hoe networks ( VANETS ) : status, results,and challenges [ J ]. Telecommunication Sys- tems, 2012, 50(4):217-241.
  • 5Qabajeh L K, Kiah M L M, Qabajeh M M. A scalable and secure position - based routing pro- tocol for ad -hoe networks [ J ]. Malaysian Jour- nal of Computer Science, 2011, 8(6) :99 - 120.
  • 6Perkins C E, Bhagwat P. Highly Dynamic Desti- nation - Sequenced Distance - Vector Routing (DSDV) for Mobile Computers [ J ]. Proceedings of ACM SIGCOMM 94 Aug, 1994, 24:234 - 244.
  • 7Clausen T H, Hansen G, Christensen L, et al. The optimized link state routing protocol, evalua- tion through experiments and simulation [ J ]. IN PROCEEDING OF WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, 2002.
  • 8Pei G, Gerla M, Chen T W. Fisheye State Rou- ting: A Routing Scheme for Ad Hoc Wireless Networks [ C ]//IN PROCEEDINGS OF ICC' 00, 2000:70 - 74.
  • 9Johnson D B, Maltz D A. Dynamic source routing in ad hoc wireless networks [ C ]// Mobile Com- puting. 1996 : 153 - 181.
  • 10Perkins C E, Royer E M. Ad hoc on -demand Jistance vector routing [ C ] In Proceedings of the and IEEE workshop on mobile computing systems -nd applications, WMCSA99, 1999:90 - 100.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部