期刊文献+

一种基于双向证书信任链的密钥管理方案 被引量:3

A Key Management Scheme based on a Two-Way Certificate Chain
下载PDF
导出
摘要 无线Ad Hoc网络已成为现今网络研究的热点,而网络安全问题一直是限制Ad Hoc网络发展的瓶颈,密钥管理对于实现安全通信起着至关重要的作用。对现有的无线Ad Hoc网络密钥管理方案进行分析,针对无线Ad Hoc网络的特点提出了一种基于双向证书信任链的自组织的密钥管理方案,该方案通过对节点间自组织的信任链进行有效的分布式管理,提高了整个系统的安全性、可控性,同时又具备良好的可扩展性。 he research of the wireless Ad Hoc network has been a hot spot in recent years ,but the security of the network restricts the AD Hoc network development, The key management plays an important role to implement the safe communication. In this paper, we analyze the existing key management schemes in the wireless Ad Hoc network, according to the characteristics of the wireless Ad Hoc network; we propose a self-organized and distributed key management scheme based on a two way certificate chain. In the scheme, the Self--organized trust chain which between the nodes was managed by the Distributed management. The security and controllability are improved in the entire system. At the same time, it has a good expansibility.
出处 《计算机安全》 2012年第2期8-12,共5页 Network & Computer Security
基金 河南省科技攻关重点项目
关键词 无线AD HOC网络 密钥管理 双向证书信任链 信任推举 Wireless Ad Hoc network Key management Two-way certificate chain Trusted nominated
  • 相关文献

参考文献10

  • 1J JubJn, J D Turnow. The DARPA Packet Radio Network Protocols[A]. Proceedings of the IEEE[C]. 1987. 21 32.
  • 2L Eschenauer and V Gligor. Distributed Sensor Networks[A]. A Key management Scheme for n Proceedings of the 9th ACM Conference on Computer and Communications Security[C],2002 41-47.
  • 3Xiangyang Li, Yu Wang, Key Agreement Protocol for Ophir Frieder. Efficient Hybrid Wireless Ad Hoc Networks[A]. Eleventh International Conference on Computer Communications and Networks(2002)[C]. NEW YORK: IEEE , 2002. 405 409.
  • 4W Lang, M zhou, K She. Key Agreement Protocol in Ad Hoc Networks[A].International Conference on Communication Technology ICCT 2003[C], 2005.
  • 5Zhou L, Haas Z. Securing ad hoc networks[J]. IEEE Net, 1999,6(15):24-30.
  • 6J Kong, P Zerfos, H Luo, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks[A] 2001 International Conference on Network Protocols ICNP[C] Washington: IEEE Computer Society, 2001. 251-260.
  • 7H Luo, P Zerfos, J Kong, et al. Self-securing Ad Hoc Wireless Networks[A]. Seventh International Symposium on Computers and Communications-ISOC 2002[C]. Los Alamitos: IEEE COMPUTER SOC, 2002. 567-574.
  • 8Jean Pierre Hubaux, Levente Burryan, Srdjan Capkun. The Quest for Security in Mobile Ad Hoc Networks[A]. The 2001 ACM Symposium on Mobile Ad Hoc Networking and Computing[C].New York: Association for Computing Machinery, 2001. 146 -155.
  • 9Srdjan Capkun, Levente Burryan, Jean Pierre Hubaux, et al. Self Organized Public Key Management for Mobile Ad Hoc Networks[J]. IEEE Transactions on Mobile Computing, 2005,2(1), 52-64.
  • 10SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-615.

同被引文献9

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部