期刊文献+

舰艇编队Ad Hoc网络信任模型

Research on Trustmodel in Ad Hoc Networks for Naval Ships Formation
下载PDF
导出
摘要 将引入权重的门限秘密共享方案与基于身份的签名方案相结合,针对海上舰艇编队网络通信簇结构提出了一个Ad Hoc网络信任模型。在模型中,系统自身完成密钥对的分发,所有簇首共享系统私钥。任意t份系统私钥分量就可恢复出系统私钥,完成编队成员的身份认证。系统周期更新密钥,可有效防御恶意攻击。 A new Ad Hoc networks trustmodel of naval ships formation based on weight threshold cryptography and identity-based cryptography was presented for the communication of naval ships formation based-on cluster networks structure.In the trustmodel,the key distribution was completed by itself,all of the head cluster share system private key.The system private key can be resumed by any t pieces of share secret key weight,complete the identity authentication for formation members.The secret key can be refreshed in a period to stand against vicious attack.
作者 陈涛 周学广
出处 《火力与指挥控制》 CSCD 北大核心 2011年第3期111-114,共4页 Fire Control & Command Control
关键词 AD HOC网络 秘密共享 权重 Ad Hoc Network secret sharing weight cluster
  • 相关文献

参考文献11

  • 1Shamir A. How to Share Secret [ J ]. Communication of ACM, 1979, 22(11): 612-613.
  • 2Blakley G R. Safeguarding Cryptographic Keys [C]//Proe AFIPS 1979 Natl Conf, NewYork, 1979: 313-317.
  • 3Kong J, Zerfos P, Luo H, etal. Providing Robust and Ubiquitous Security Support for Mobile Ad hoe Networks [C-]//Proe 9th Int' 1Conf Network Protocols (ICNP), 2001,.
  • 4许峰,谢冬莉,黄皓,王志坚.一个基于权限的移动自组网门限信任模型[J].计算机应用,2006,26(3):574-576. 被引量:2
  • 5张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6
  • 6Boneh D, Franklin M. Identity-based Encryption From the Weil Pairing [C]//Proceedings of the Cryptology-Crypto 2001 : 213-229.
  • 7Hess F. Exponent Group Signature Schemes and Efficient Identity based Signature Schemes Based on Pairing [EB/OL]. http//epring iacr. org, 2002-08-09.
  • 8胡荣磊,刘建伟,张其善.基于簇的ad hoc网络密钥管理方案[J].通信学报,2008,29(10):223-228. 被引量:4
  • 9Petersen H, Horster P. Self-certified Keys-concepts and Application [ C ]//Third Conference on Communication and Multimedia Security. Athens: Chapman&Hall, 1997 : 102-116.
  • 10Zhou L,Hass Z J. Securing Ad Hoe Networks[J]. IEEE Network, 1999, 13(6): 24-29.

二级参考文献26

  • 1BASAGNI S, HERRIN K. Secure pebblenets[A]. The 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing[C]. New York: ACM Press, 2001, 156-163.
  • 2ELHDHILI M E, AZZOUZ L B, KAMOUN F. A totally distributed cluster based key management model for ad hoc networks[A]. The Third Annual Mediterranean Ad Hoc Networking Workshop[C]. Bedrum, Turkey: IEEE Computer Society, 2004. 27-30.
  • 3BECHLER M, HOF H J, KRAFT D, et al. A cluster-based security architecture for ad hoc networks[A]. In: 23rd Annual Joint Conference of the IEEE Computer and Communication% Societies (INFOCOM '04)[C]. Hong Kong, 2004. 2393-2403.
  • 4GIRAULT M. Self-certified public keys[A]. Advances in Cryptology, EUROCRYPT '91[C]. New York: Springer-Verlag, 1991.490-497.
  • 5PETERSEN H, HORSTER E Self-certified keys -concepts and application[A]. Third Conference on Communication and Multimedia Security[C]. Athens: Chapman & Hall, 1997. 102-116.
  • 6PEDERSEN T E A threshold cryptosystem without a trusted party[A]. Advances in Cryptology-Eurocrypt'91[C]. New York: Springer- Verlag, 1991. 522-526.
  • 7HORSTER P, MICHELS M, PETERSEN H. Meta-EIGamal signature schemes[A]. Proceedings of the 2nd Annual ACM Conference on Computer and Communications Security[C]. ACM Press, 1994. 96-107.
  • 8ZHOU L, HAAS Z J. Securing ad hoc networks[J]. IEEE Network Journal, 1999, 13(6): 24-30.
  • 9KONG J, ZERFOS P, LUO H, et al. Providing robust and ubiquitous security support for mobile ad-hoc networks[A]. The Ninth International Conference on Network Protocols (ICNP'01)[C]. Washington: IEEE Computer Society, 2001.251-260.
  • 10GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems[J]. Journal of Cryptology, 2007, 20(1):51-83.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部