期刊文献+

边远岛无线数据传输系统的多路径容侵路由方案研究

Research on Muli-path Intrusion Tolerant Wireless Transmission Method for Remote Islands
下载PDF
导出
摘要 针对边远岛无线数据传输对路径可靠性要求高,且现有的MAODV路由协议可生存性差的情况,提出了基于通用攻击结构的秘密共享方案以及入侵容忍路由法则,并对法则的完备性进行了分析。对MAODV协议进行了修改,使其满足入侵容忍路由法则的要求。最后利用NS-2仿真软件及其辅助工具对修改后的协议进行了仿真实验,并对试验结果进行了分析。 Aiming at the demand of reliability of wireless-transmission for remote islands and the shortage of survivability in the existing MAODV routing method,the general attack structure and intrusion tolerant routing method have been proposed.The usability of these methods has been discussed.Then,the original MAODV protocol has been modified to fit the methods above.In the end,the NS-2 with its auxiliary tools has been employed to prove the methods and the performance.
出处 《海洋技术》 北大核心 2011年第4期64-67,共4页 Ocean Technology
基金 海洋公益性专项资助项目(200805079)
关键词 边远岛 无线传输 MAODV路由协议 入侵容忍 NS-2仿真 remote islands wireless-transmission MAODV routing method intrusion tolerance NS-2 simulation
  • 相关文献

参考文献7

二级参考文献57

  • 1Herzberg A, Jakobsson M, Jarecki S. Proactive Public-Key and Signature Schemes[C]. In Proceedings of the 4th Annual Conference on Computer Communications Security, 1997. 100-110.
  • 2Gennaro R, Jarecki S, Krawczyk H, et al. Rabin. Robust Threshold DSS Signatures[C]. Advances in Cryptology-Eurocrypt'96, International Conference on the Theory and Application of Cryptographic Techniques, 1996. 354-371.
  • 3Ostrovsky R, Yung M. How to Withstand Mobile Virus Attacks[C]. In Proceedings of the 10th Annual Symposium on Principles of Distributed Computing, 1991. 51-59.
  • 4Blakley G R. Safeguarding Cryptographic Keys[C]. Proceedings of the 1979 National Computer Conference, Volume 48 of AFIPS Conference Proceedings, 1979. 313-317.
  • 5Shamir A. How to Share a Secret[J]. Communication of the ACM, 1979,22(11):612-613.
  • 6Feldman P. A Practical Scheme for Non-Interactive Verifiable Secret Sharing[J]. In Proc.28th Annual Symp. 1987.427-437.
  • 7Gemmell P. An Introduction to Threshold Cryptography[J]. Cryptobytes, 1997: 7-12.
  • 8Pedersen T. Non-Interactive and Information-Theoretic Secure Verifiable secret Sharing[C]. Advances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, 1992. 129-140.
  • 9Wu T, Malkin M, Boneh D. Building Intrusion Tolerant Applications[C].In Proceedings of the 8th USENIX Security Symposium, 1999. 79-91.
  • 10Herzberg A, Jarecki S, Krawczyk H, et al. Proactive Secret Sharing or: How to Cope with Perpetual Leakage[C]. Advances in Cryptology-Crypto'95, the 15th Annual International Cryptology Conference, 1995. 457-469.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部