期刊文献+

基于身份密码体制的AODV安全改进

AODV Security Improvement of Identity-based Cryptosystem
下载PDF
导出
摘要 Adhoc网络安全问题阻碍了其向商业领域的发展。针对该问题,在原有AODV路由算法的基础上,采用基于身份的密码体制设计一种安全路由方案ISAODV。仿真结果表明,在基于身份的密码学系统中,不需要证书,可以使用姓名、IP地址、电子邮件地址等用户标识作为公钥,不需要存储公钥证书,能够简化基于证书的密码系统繁琐的密钥管理过程。 The security of Ad hoc network is a prominent problem. This is exactly the obstacle that the Ad hoc network develops to commerce field. This paper proposes a kind of safety strategy ISAODV on identity-based cryptosysteln based on the AODV route algorithm. The identity-based cryptology does not need a certificate in system while the user's identity such as name, IP address, E-mail address etc can be used as the public key and the public key certificate does not need to be stored. The simulation proves that the ISAODV can simplify the miscellaneous and trivial administration process of the secret key on certificate-based password system.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第22期137-139,共3页 Computer Engineering
基金 湖南省科技计划基金资助项目(2009GK3016)
关键词 AD HOC网络 安全 基于身份的密码体制 Ad hoc network security identity-based cryptosystem
  • 相关文献

参考文献6

  • 1王振中,关媛,陆建德,陈玉春.基于邻居节点监测的MANET路由安全机制[J].计算机工程,2007,33(18):148-150. 被引量:2
  • 2PaPadimitratos P, Haas Z J. Secure Routing: for Mobile Ad Hoc Networks[C]//Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference. San Antonio, TX, USA: [s. n.], 2002: 27-31.
  • 3Salizgiri K, LaFlamme D, Dahill, et al. Authenticated Routing for Ad Hoc Networks[J]. IEEE Journal on Selected Areas in Communications, 2005, 23(3): 598-610.
  • 4Zapata M G. Secure Ad Hoc On-demand Distance Vector(SAODV) Routing[EB/OL]. (2005-02-11 ). draft-guerrero-manet-saodv-05.txt.
  • 5Kim Heeyoul, Song Jumin, Yoon Hyunsoo. A Practical Approach of ID-based Cryptosystem in Ad Hoc Networks[J]. Wireless Communication and Mobile Computing, 2007, 7(7): 909-917.
  • 6Masmoudi K, Building K A. Identity:based Security Associations for Provider-provisioned Virtual PrivateNetworks[J]. Telecommunication Systems, 2008, 39(4): 215-222.

二级参考文献11

  • 1蒋廷耀,杨景华,李庆华.移动Adhoc网络安全技术研究进展[J].计算机应用研究,2005,22(2):1-4. 被引量:9
  • 2Chin-Yang Tseng,Balasubramanyam P.A Specification-based Intrusion Detection System for AODV[C]//Proc.of ACM Workshop on Security of Ad Hoc and Sensor Networks,Fairfax,VA,USA.2003.
  • 3Marti S,Giuli T J,Lai K,et al.Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[EB/OL].(2000-09).http://citeseer.nj.nec.com/marti00mitigating.html.
  • 4Balasubramaniyan J S,Fernandez J O G,Isacoff D,et al.An Architecture for Intrusion Detection Using Autonomous Agents[R].Purdue University,1998.
  • 5Perkins C,Royer E,Das S.Ad Hoc on Demand Distance Vector Routing[S].RFC 3561,2003-07.
  • 6Johnson D B,Maltz D A,Hu Y C.The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks[Z].(2004-07).IETF draftietf-manet-dsr10.txt.
  • 7Toh C K.Associatibity-based Routing for Ad Hoc Mobile Networks[J].Wireless Personal Communications,1997,4(2):103-109.
  • 8Zapata M G.Secure Ad Hoc On-demand Distance Vector Routing[[J].ACM Mobile Computing and Communications Review,2002,6(3):106-107.
  • 9Zapata M G,Asokan N.Securing Ad Hoc Routing Protocols[C]// Proceedings of the ACM Workshop on Wireless Security.2002:1-10.
  • 10Sanzgiri K,Dahill B,Levine B N,et al.A Secure Routing Protocol for Ad Hoc Networks[C]//Proceedings of IEEE International Conference on Network Protocols.2002-11.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部