期刊文献+

基于Merkle可信树的DTN网络分片认证研究

Research on Certification of DTN Network Fragmentation Base on Merkle Certification Tree
下载PDF
导出
摘要 DTN网络的工作环境决定了传统的安全认证机制无法使用,现有的认证算法存在着持续时间过长,对DTN网络的存储与通信资源占用过大、使用条件苛刻等诸多缺陷。文章主要以Merkle可信树为基础,通过研究DTN(Delay/Disrupted Tolerant Networks,容断容延迟网络)中的安全分片认证机制,结合身份认证机制,设计了一套适用于DTN网络的分片认证算法。该算法在性能表现上优于现有算法,具有较高的实用价值。 The working environment of the DTN network determines the unusable of traditional security authentication mechanism. The existing authentication algorithm has many defects such as long duration, DTN network storage and communication resources occupying large space and strict using condition and so on. In the present paper, a set of authentication algorithm of the DTN network chip was designed mainly based on Merkle certification the tree by studying the DTN (Delay / Disrupted Tolerant Networks, Yung-off delay network capacity) network security authentication mechanism combining with the authentication mechanism, The alaorithm performance is suoerior to existin~ algorithms with a high oractieal value.
出处 《西藏大学学报(社会科学版)》 CSSCI 2012年第2期76-79,共4页 Journal of Tibet University
基金 国家自然科学基金项目"基于国际编码标准的藏文词语排序算法研究"阶段性成果 项目号:61163013
关键词 容断容延迟网络 分片认证 Merkle可信树 Content-off delay network capacity Fragmentation certification Merkle tree certification
  • 相关文献

参考文献6

  • 1Fall K.A delay-tolerant network architecture for challenged Intemets[G]. proceedings ofSIGCOMM'03 2003:27-34.
  • 2Fall K, Farrell S, DTN.an architectural retrospective[J].Journal of Selected Areas in Communications, 2008, 26(5):828-836.
  • 3Daly E M, Haahr M.The challenges of disconnected delay-tolerant MANETs[J].Ad Hoc Networks, 2010,8(4):241-253.
  • 4Ralph C Merkle. A certified digital signature. Advances in Cryptology-CRYPTO'89 [M]. Berlin: Springer-Verlag, 1989: 218-238.
  • 5Partridge C. Authentication for Fragments [G] .Fourth Workshop on Hot Topics in Networks (HotNets IV). College park, MD, November 2005.
  • 6Luis Carlos Coronado Garc'la. On the security and the efficciency of the Mekle signature scheme [DB/OL]. Cryptology ePrint Archive, 2005, http://eprint. Iacr org/2005/192.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部