期刊文献+

Ad hoc网络中基于门限秘密共享方案的安全性分析与优化

The analysis and optimization of secret sharing scheme based on threshold in Ad hoc networks
下载PDF
导出
摘要 通过对Ad hoc网络攻击的分类,建立了Ad hoc网络的静态和动态攻击模型,并以此为基础分析了门限秘密共享方案中门限值和秘密更新时间对网络安全性能的影响.通过分析不同节点密度下秘密共享方案中门限值对网络安全性的影响,确定了选取最优的门限值的公式,同时根据运行状况,确定了秘密更新时间的选择公式,确保了Ad hoc网络的安全性. Based on the classification of the Ad hoc network attacks,this paper establishs a static attack model in Ad hoc network and a dynamic attack model in Ad hoc network.Then it analysis the threshold's and the secret update time's influence on the network security based on the two models.By analyzing dynamic changes of the number of nodes and topology in the ad hoc network,we believe there are exist a optimal threshold and a secret update time,which can let the network security achieve higher in different intensity of the attack.
作者 黄欣 熊国华
出处 《东北师大学报(自然科学版)》 CAS CSCD 北大核心 2012年第4期61-65,共5页 Journal of Northeast Normal University(Natural Science Edition)
基金 国家高技术研究发展计划(863)项目(2009AA02z12)
关键词 AD HOC网络 静态安全模型 动态安全模型 门限值 秘密更新时间 Ad hoc networks static security model dynamic security model threshold secret update time
  • 相关文献

参考文献14

  • 1英春,史美林.自组网体系结构研究[J].通信学报,1999,20(9):47-54. 被引量:59
  • 2MCKENNEY P E,BAUSBACHER P E. Physical-layer and link-layer modeling of packet-radio network performance[J], IEEEJournal on Selected Areas in Communications,1991,9(1) *59-64.
  • 3BLOM R. An optimal class of symmetric key generation systems[C]//EURO-CRYPT,Paris:Springe-Verlag, 1984:335-338.
  • 4CHAN H. Random key predistribution schemes for sensor networks [C]//Proceedings of IEEE Symposium on Security andPrivacy,Berkeley:IEEE Press,2003: 197-213.
  • 5DU W. A key management scheme for wireless sensor networks using deployment knowledge[C]//IEEE INFOCOM'04, HongKong: IEEE Press,2004 : 7-11.
  • 6LIU D. Location-based pairwise key establishments for relatively static sensor networks[C]//ACM Workshop on Security ofAd hoc and Sensor Networks,Berkeley : IEEE Press,2003 : 61-77.
  • 7BLOM R.An optimal class of symmetric key generation systems[C]//EURO-CRYPT,Paris:Springe-Verlag, 1984:335-338.
  • 8YI S,KRAVERS R. Practical PKI for Ad hoc wireless networks [ R]. Department of Computer Science, University ofIllinois,2001.
  • 9YI S, KRAVERS R. MOCA: mobile certificate authority for wireless ad hoc networks[C]//Proc of the 2nd Annual PKIResearch Workshop,Berkeley :IEEE Press,2003 : 28-29.
  • 10ZHOU L,HAAS Z J. Securing ad hoc networks[J]. IEEE Network Magzine, 1999,12(6) :24-30.

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部