期刊文献+

基于Ad Hoc网络的安全路由技术的研究 被引量:1

Study for Secure Routing Technology based on Ad Hoc Network
下载PDF
导出
摘要 为防止Ad Hoc网络路由消息的伪造和篡改问题,本文提出了一种安全有效的路由方案SERS(Secure and Efficient Routing Scheme).在DSR(动态源路由协议)中引入了安全机制,在尽可能降低网络资源消耗的基础上,采用SUCV(statistically unique and cryptographically verifiable)标识符避免密钥分发问题,并运用公钥PK与IP地址的绑定来完成密钥分发过程,使用公钥PK与IP地址的绑定来完成密钥分发过程,使得没有密钥的节点不可能伪造报文.使用基于端到端的认证和基于对称密钥的认证检测出被篡改后的报文,从而保证路由消息的不可伪造、并防止其它节点对消息的篡改.实验结果表明,采用该方案能够满足设计的要求. In order to prevent Ad Hoc network routing information from forgery and tampering,this paper presents a kind of safe and effective routing scheme SERS.In the DSR(Dynamic Source Routing Protocol),security mechanisms are introduced into it on the basis of reducing network resource consumption as low as possible,and employ SUCV(statistically unique and cryptographically verifiable) [1] identifier to avoid the key distribution problem,bound public key PK and IP address to complete the key distribution process,so nodes without keys can not forge packets.Using end-to-end authentication and symmetric key authentication detect tampered packets,which ensure routing messages not to be forged no false,and prevent other nodes to tamper the messages.The experiment results show that the scheme can meet the design requirements.
作者 潘晓君
出处 《枣庄学院学报》 2010年第5期91-94,共4页 Journal of Zaozhuang University
基金 国家电子信息产业发展基金资助项目(信部运[2006]634号)
关键词 AD HOC网络 安全路由 篡改 Ad Hoc Network Secure Routing Tamper
  • 相关文献

参考文献4

二级参考文献105

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 3[1]Qayyum A, Laouiti A, Viennot L. Multipoint Relaying.. An Efficient Technique for Flooding in Mobile Wireless Networks. In..Proc. of 35th Annual Hawaii Intl. Conf. on System Sciences(HICSS'2001), 2001
  • 4[2]Zapata M G, Asokan N. Securing Ad Hoc Routing Protocols. In:Proc. ot ACM WiSe'02,Atlanta ,Geogia,USA,Sep. 2002
  • 5[3]Dahill B, et al. A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of the 10th IEEE Intl. Conf. on Network Protocols(ICNP) ,Nov. 2002
  • 6[4]Lamparter B,Plaggemeier M, Westhoff D. Analysis of Co-operation Approaches in Ad Hoc Networks. In:Proc. of WiOpt'03,INRIA Sophia-Antipolis, France, March, 2003
  • 7[5]Perkins C E, Bhagwat P. Highly Dynamic Destination-Sequenced Distance Vector (DSDV)for Mobile Computers. In: Proc. of the SIGCOMM 1994 Conf. on Communications Architectures, Protocols and Applications ,Aug. 1994
  • 8[6]Buchegger S,Boudec J L. Performance Analysis of the CONFIDANT Protocol. In: Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing(MobiHoc),EPFL Lausanne,Switzerland ,June 2002
  • 9[7]Perkins C E,Royer E M B,Das S R. Ad hoc On-Demand Distance Vector (AODV) Routing. draft-ietf-manet-aodv-11. txt. June2002. (expired)
  • 10[8]Johnson D B,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks(DSR). draft-ietf-manet-dsr-07. txt. Feb.2002. (expired)

共引文献99

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部