期刊文献+

一种Ad Hoc网中相邻节点的匿名认证与安全通信方案 被引量:1

A new anonymous authentication and secure communication scheme among neighbor nodes in Ad Hoc network
原文传递
导出
摘要 随着无线传感器网络(WSN)的广泛应用,在某些场合不仅需要保证传送信息的安全性,还需要保证节点在传送信息过程中的匿名性和私有性,如何设计出安全有效的无线传感器网络匿名通信协议已成为当前研究的热点.本文提出与设计了一种新型链路层通信与接入认证的匿名安全方案.本方案考虑了随机化物理层唯一身份指纹MAC地址、节点入网权限以及动态撤销.其特点是:利用基于身份的加密方案实现系统中节点的身份隐藏;利用基于多项式的密钥发布方案实现节点入网权限的动态回收;利用压缩的Bloom Filter可在身份隐藏情况下对恶意节点的行为进行追踪.最后分析了本方案在攻击方采用主动攻击和被动攻击方式下的安全性与匿名性. With the widespread applications of large scale distributed Wireless Sensor Network (WSN), in some situations, the security of WSN involves not only the security of sending data by sensors, but also the anonymity and privacy during the sending process. How to design a secure efficient anonymous communication scheme for wireless sensor network has become a research hotspot. In this paper a new anonymous authentication and secure communication scheme among neighbor nodes in wireless sensor network, which take care of random MAC and access dynamic withdrawing, is presented. There are three characters of our scheme as follows, one is node's anonymous by Identify-based Encryption, the other is dynamic revocation capability of node's access for wireless sensor network by efficient self-heal- ing group key distribution, and the another is tradeoff for malicious node under identify anonymous by compressed bloom filters. Finally, the security and anonymous of our algorithm are analysed.
作者 石伟 谭良
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第5期1047-1052,共6页 Journal of Sichuan University(Natural Science Edition)
基金 国家自然科学基金面上项目(6097011) 四川省青年科技基金(2011JQ0038)
关键词 双向认证 BLOOM Filter 基于身份的密码系统 匿名性 移动自组网络 double authentication, Bloom Filter, identify-based encryption system, anonymous, Ad Hoc network
  • 相关文献

参考文献15

  • 1Kong J, Hong X. Anodr: anonymous on demand routing with untraceable routes for mobile Ad-Hoc networks [C]. Annapolis, MD, USA: ACM Press, 2003.
  • 2Zhu B O, Wan Z G, Kankanhallim S, et al. Anony mous secure routing in mobile Ad-Hoc networks[C]. Tampa, USA: IEEE Computer Society, 2004.
  • 3章洋,范植华,何晓新,徐帆江,王宇心.移动自组网络中多径路由的匿名安全[J].电子学报,2005,33(11):2022-2030. 被引量:14
  • 4Misra S, Xue G. Efficient anonymity schemes for clustered wireless sensor networks[J]. International Journal o{ Sensor Networks, 2006, 1(1 /2):50.
  • 5Yi O Y, Le Z Y, Xu Y R, etal. Providing anonymity in wireless sensor networks [C]. Washington, 13(3: IEEE Computer Society, 2007.
  • 6Srdjan Capkun, Jean-Pierre Hubaux2 and Markus Ja- kobsson. Secure and Privacy-Preserving Communi- cation in Hybrid Ad Hoe Networks[R]. EPFL-IC technical report no, 2004.
  • 7Zhang Y C, Liu W, Lou W J. Anonymous Communications in Mobile Ad Hoe Networks[C]//Local Computer Networks, 2004,29th Annual IEEE international Conference. [s. 1. ] ,[s. n. ], 2004.
  • 8EI-Khatib K, Korba L, Song R, etal. Secure dy- namic distributed routing algorithm for Ad Hoe wireless networks[C] // International Conference on Parallel Processing Workshops (ICPPW ' 03). [s. 1, ].[s. n.], 2003.
  • 9Kong J, Hong X. ANODR.. ANonymous on demand routing with untraceable routes for mobile ad-hoc networks[C] // Fourth ACM International Symposi- um on Mobile Ad Hoc Networking and Computing (MobiHoc'03). Is. 1. ]:[s. n. ], 20031.
  • 10Zhu B, Wan Z G, Mohan S,et al. Anonymous se- cure routing in mobile ad-hoe networks[C]//Proceedings of the 4th ACM international symposium on Mobile Ad Hoc networking & computing. [s. 1. ]: Is. n. 3, Z003.

二级参考文献13

  • 1K El-Khatib,L Korba,R Song,G Yee.Secure dynamic distributed routing algorithm for ad hoc wireless networks[A].In Inter national Conference on Parallel Processing Workshops (ICPPW'03)[C].Kaohsiung,Taiwan:IEEE Computer Society,2003.359-366.
  • 2J Kong,X Hong.ANODR:ANonymous on demand routing with untraceable routes for mobile ad-hoc networks[A].In Fourth ACM Inter national Symposium on Mobile Ad HocNetworking and Computing (MobiHoc'03)[C].Annapolis,Md,USA:ACM,2003.291-302.
  • 3Bo Zhu,Zhiguo Wan,et al.Anonymous Secure Routing in Mobile Ad-hoc Networks[A].the 29th Annual IEEE inter national Conference on Local Computer Networks[C].Tampa,USA:IEEE Computer Society,2004.102-108.
  • 4Y C Hu,D B Johnson,A Perrig.SEAD:Secure efficient distance vector routing for mobile wireless ad hoc networks[A].In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)[C].NY,USA:IEEE Computer Society,2002.3-13.
  • 5Y-C Hu,A Perrig,D B Johnson.Ariadne:A secure ondemand routing protocol for ad hoc networks[A].In Proceedings of the Eighth Annual Inter national Conference on Mobile Computing and Networking (MobiCom 2002)[C].Georgia,USA:ACM,2002.12-23.
  • 6A Nasipuri,S R Das.On-Demand Multipath Routing for Mobile Ad Hoc Networks[A].Proceedings of IEEE ICCCN'99[C].Boston,USA:IEEE Computer Society,1999.64-70.
  • 7J Raju,J J Garcia-Luna-Aceves.A New Approach to On-demand Loop-Free Multipath Routing[A].Proceedings of IEEE ICCCN'99[C].Boston,USA:IEEE Computer Society,1999.522-527.
  • 8Sung-Ju Lee,Mario Gerla.Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks[A].In Proceedings of the IEEE ICC,2001[C].Helsinki:IEEE Computer Society,2001.3201-3205.
  • 9Baruch Awerbuch David Holmer Herbert Rubens.Provably Secure Competitive Routing against Proactive Byzantine Adversaries via Reinforcement Lear ning[R].Technical Report Version 1,May 16,2003.Computer Science Department,Johns Hopkins University.
  • 10Nicolao Cesa-Bianchi,Yoav Freund,David P Helmbold,David Haussler,Robert E Schapire,Manfred K Warmuth.How to use expert advice[J].Jour nal of the Association for Com-puting Machinery,1993.382-391.

共引文献13

同被引文献19

  • 1Xiao Y, Pan Y. Differentiation, QoS guarantee, and optimization for real-time traffic over one-hop Ad hoc networks[J].IEEE Transaction on Parallel Distribu- ted Systems, 2005, 16(6): 538.
  • 2Renesse R, Friderikos V, Aghvami H. Crosslayer cooperation for accurate admission control decisions in mobile Ad hoc networks [J]. IET Communica- tions, 2007, 1(4):577.
  • 3Ng P C, Liew S C. Throughput analysis of IEEE 802.11 multi-hop Ad hoe networks[J]. IEEE Trans- actions on Networking, 2007, 15(2): 309.
  • 4Sun J, Rashvand H F, Zhu H B. Opportunistic spec- trum access framework for video over Ad hoc wire- less networks [J]. IET Communications, 2010, 4 (11) : 1269.
  • 5Peng j, Sikdar B, Cheng L. Multicasting with local-ized control in wireless Ad hoe networks[J]. IEEE Transactions on Mobile Computing 2009, 8(1) : 52.
  • 6Li X Y. Multicast capacity of wireless Ad hoe net- works [J].IEEE/ACM Transactions on Networ- king, 2009, 17(3): 950.
  • 7Zhao M, Wang W Y. A unified mobility model for analysis and simulation of mobile wireless networks [J].Wireless Networks, 2009, 15(3): 365.
  • 8Raghunathan V, Kumar P R. A counterexample in congestion control of wireless networks [J].Per- formance Evaluation, 2007, 64(5): 399.
  • 9Zhai H Q, Chen X, Fang Y G. Improving transport layer performance in multihop Ad hoe networks by exploiting MAC layer information[J]. IEEE Trans- actions on Wireless Communication, 2007, 6 (5) : 1692.
  • 10Bisnik N, Abouzeid A. Queuing network models for delay analysis of multihop wireless Ad hoc networks [J]. Ad hoe Networks, 2009, 7(1) :79.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部