期刊文献+

MANET环境下的密钥预共享安全引导模型

Security bootstrapping model of key pre-sharing in MANET
原文传递
导出
摘要 提出了一种移动自组织网络(MANET)环境下基于单向哈希函数和拉格朗日插值多项式组的(t,n)门限方案的随机密钥预共享安全引导模型,该安全引导过程分为基于单向哈希函数和拉格朗日插值多项式组的密钥预共享安全引导过程以及基于门限数字签名的密钥安全恢复协议2个部分.引导模型采用了单向哈希函数,使得每个密钥分片的子密钥难以被暴露,同时将门限数字签名机制引入到了密钥恢复协议的安全引导过程中,有效检测和防止了在密钥恢复或重组过程中的欺骗行为以及DoS攻击.实验验证从安全引导成功的性能、模型计算复杂度、节点被俘后的网络恢复能力、引导过程安全性、网络对各种路由攻击的抵抗力以及支持的网络规模等方面进行了评价,结果表明该模型有较好的安全性与实用性. Key pre-sharing model based on one-way hash function and (t,n) threshold schema of La- grange polynomial group was proposed to implement the security bootstrapping in mobile Ad hoc net- works (MANET) environment. This model involved following two phases, including the pre-sharing keys based on one way hash function and'I Lagrange interpolation polynomial group, and recovering the secure key based on the digital signature of threshold schema. The one way hash approach can effec- tively prevent the splitted key pieces in a key pool from being exposed. The digital signature of threshold schema also has advantages to detect and block the DoS attack and other malicious fraudu- lent behaviors during the processes of key reconstruction and recovery. The experiments of simulated environment were performed to validate the approach on the performance of successful establishing se- cure link, computation complexity, the security of bootstrapping process, the capability of network recovery from compromised nodes, and the network scale etc. The simulated experimental results show that this approach can harden the security of MANET environment with better performance.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第9期38-43,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国防科工委'十一五'重点研究项目(C0820061362-06 A1420080183) 国家高技术研究发展计划资助项目(2007AA01Z464)
关键词 移动安全 安全引导模型 移动自组织网络(MANET) 拉格朗日插值多项式组 单向哈希函数 门限数字签名 mobile security security bootstrapping model mobile Ad hoc networks (MANET) La-grange interpolation polynomial group one way hash threshold digital signature
  • 相关文献

参考文献12

  • 1Chan H W, Perrig A, Song D. Random key predistribution schemes for sensor networks[C] // Proceeding of the IEEE Computer Society Symposium on Security and Privacy. Piscataway: IEEE, 2003: 197-213.
  • 2Jianbo Y. A security architecture for wireless sensor networks based-on public key cryptography[C]//Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. Beijing: IEEE, 2009: 3648-3650.
  • 3Haowen C, Virgil D G, Adrian P, et al. On the distribution and revocation of cryptographic keys in sen- sor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(3):233-247.
  • 4Taekyoung K, JongHyup L, JooSeok S. Location- based pairwise key predistribution for wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(11) : 5436-5442.
  • 5Jang P S, Jui C C. Pair-wise path key establishment in wireless sensor networks [J]. Computer Communications, 2007, 30(11-12): 2365-2374.
  • 6Dijiang H, Manish M, Deep M, et al. Location-aware key management scheme for wireless sensor networks[C]//Proceeding of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks (SASN). New York: ACM, 2004: 29-42.
  • 7Paschalidis I C, Yin C. Statistical anomaly detection with sensor networks[J]. ACM Transactions on Sensor Networks (TOSN), 2010, 7(2): 1-23.
  • 8Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//Proc 9th ACM Conf on Computer and Communication Security. New York: ACM, 2002: 41-47.
  • 9Liu D G, Ning P. Establishing pairwise keys in distributed sensor networks [C] // Proceedings of 10th ACM Conference on Computer and Communications Security. Washington: ACM, 2004:52-61.
  • 10Mahalingam R. Menon N. Pre-loaded key based multicast and broadcast authentication in mobile adhoc networks[C]//Proceedings of Global Telecommunications Conference. San Francisco: IEEE, 2003 : 1405-1409.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部