期刊文献+

基于身份认证的Ad Hoc密钥协商方案 被引量:3

Session key agreement scheme for Ad Hoc network based on identity authentication
下载PDF
导出
摘要 为了在Ad Hoc网络中建立安全可靠的会话密钥,提出一种新的适合于Ad Hoc网络的基于身份认证和门限机制的会话密钥协商方案。首先,提出基于身份的双向认证方案,在保证系统私钥安全的前提下,将系统私钥与哈希函数结合,既保证了节点身份的真实性,又避免了采用公钥证书引起的复杂管理问题,同时,该方案具有前向保密性与抗中间人攻击的性能;其次,采用门限机制,通过更新密钥份额来加强系统私钥的安全性避免了Ad Hoc网络的单点失效问题;最后,从正确性、安全性和性能3方面进行分析与研究。研究结果表明:该方案较节约网络资源,具有较高的安全性与可靠性。 To build a safe and credible session key,a new session key agreement scheme based on identity authentication and combined with enter restriction scheme was proposed.Firstly,the improved alternation identity-based authentication that combines with system private key and hash function was proposed for the safety of system private key.It guarantees node to communicate with the right one and avoids complicated management problem that may be caused by public key certificate.At the same time,the scheme has forward secrecy and anti-attack performance of intermediaries.Secondly,enter restriction scheme,which updates key share to strengthen the security of private key,and avoids single node's invalidation in Ad Hoc network.Finally,the correctness,security and performance were analyzed.The result shows that the scheme saves network resources and has high security and reliability.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第6期2236-2239,共4页 Journal of Central South University:Science and Technology
基金 国家自然科学基金资助项目(60773013) 湖南省自然科学基金资助项目(07JJ5078)
关键词 ADHOC网络 密钥协商 基于身份的双向认证 门限方案 Ad Hoc network key agreement mutual identity-based authentication threshold scheme
  • 相关文献

参考文献8

二级参考文献42

共引文献61

同被引文献32

  • 1周晶,蒋泽军,徐邦海.Ad Hoc网络安全[J].微计算机应用,2005,26(1):11-13. 被引量:7
  • 2李光松,韩文报.分簇Ad Hoc网络的密钥管理[J].计算机科学,2006,33(2):79-82. 被引量:6
  • 3叶永飞,余梅生.基于簇结构的Ad Hoc网络安全密钥管理方案[J].计算机应用,2007,27(3):611-613. 被引量:1
  • 4ZHOU L, HAAS Z J. Securing Ad hoc Networks[J]. IEEE Networks, 1999, 13(6): 24-30.
  • 5LUO H, ZERFOS P, KONG J, et al. Self-securing Ad Hoc Wireless Networks[C]. In: 7th 1EEE Symp on Computers and Communications, 2002. 567-574.
  • 6KHALILI A, KATZ J, ARBAUGH W A. Towards Secure Key Distribution in Truly Ad Hoc Networks[C]. In: Proc. oflEEE Workshop on Security and Assurance in Ad hoc Networks, 2003.
  • 7Shamir. How to Share a Secret [J]. Communication of the ACM, 1979, 22(11): 612-613.
  • 8邱卫东,黄征,李祥学,郭捷密码协议基础[M].北京:高等教育出版社,2008,130-150.
  • 9戴桦.基于可信计算技术的信任评估机制研究[D].南京:南京邮电大学,2011:5.
  • 10周永明.网络隔离与安全交互原型研究[D].上海:同济大学,2006.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部