期刊文献+

一种适用于多跳认知无线电网络的高效IBE方案 被引量:2

Efficient and Provably Secure IBE Scheme Suitable for Multi-hop Cognitive Radio Networks
下载PDF
导出
摘要 研究了认知无线网络的安全方案。针对认知无线网络存在的安全问题,结合网络的特点,提出了一种基于身份的安全解决方案,即Yu-IBE方案。该方案无需在线可信第三方即可实现认知节点的身份认证,其功能与PKI类似,但认证链却简单很多。该安全解决方案能通过较少的基础设施实现系统密钥的分发、密钥定期更换、域内及跨域通信等功能。将Yu-IBE总体安全解决方案与已有的两种知名数据融合方案进行了对比仿真,结果显示,Yu-IBE方案在所列攻击类型下均具有较好的稳定性,认知正确率始终保持较高水平。 Aiming at cognitive wireless network security issues and combining with the eharactensUcs oI me networK, an identity-based security solution named Yu-the IBE scheme was proposed. The solution can realize cognitive node au- thentication without online trusted third party. Its function is similar with PKI, but certification chain is much simpler than the PKI. This security solution can realize the function of system key distribution, key regularly replace, domain and cross-domain communication with less infrastructure. In addition, this paper compared overall security solution of YtrlBE with the existing two well-known data integration program. The simulation results show that the Yu-IBE pro- gram has better stability, and cognitive correct rate has remained relatively high level.
出处 《计算机科学》 CSCD 北大核心 2013年第2期71-77,共7页 Computer Science
基金 "973"项目(2009CB320403) 国家自然科学基金(60832008 60832006)资助
关键词 认知无线网络 密码体制 基于身份的加密 公钥基础设施 Cognitive wireless network Cryptosystem, IBE, PKI
  • 相关文献

参考文献18

  • 1Chen R,Park J. Ensuring trustworthy spectrum sensing in cognitive radio networks[A].2006.147-152.
  • 2Johnston D. 802.22 security sublayer proposal[S].IEEE,2007.246-255.
  • 3Mishra S M,Tandra R,Sahai A. Coexistence with primary users of different scales[A].2007.373-379.
  • 4Zhao J,Zheng H,Yang G H. Distributed coordination in dynamic spectrum allocation networks[A].2005.76-84.
  • 5Bian K G,Park J M. MAC-layer misbehaviors in multi-hop cognitive radio networks[A].2006.65-73.
  • 6Sethi A,Brown T X. Potential cognitive radio denial-of-service vulnerabilities and countermeasures[A].2007.236-242.
  • 7Raya M,Hubaux J P,Aad I. DOMINO:a system to detect greedy behavior in IEEE 802.11 hotspots[A].2004.42-50.
  • 8Radosavac S,Baras J S,Koutsopoulos I. A framework for MACprotocol misbehavior detection in wireless networks[A].2005.98-105.
  • 9Shamir A. Identity-based cryptosystems and signature schemes[A].Springer-verlag,1985.48-53.
  • 10Boneh D,Franklin M. Identity-Based Encryption from the Weil Pairing[A].California:Springer-Verlag,2001.231-229.

二级参考文献29

  • 1钟旭,陆浪如,南相浩,洪泽勤.一种基于种子密钥SPK的IBE加密体制设计方案[J].微计算机信息,2005,21(4):226-227. 被引量:12
  • 2Shamir A. Identity-based cryptosystems and signature schemes//Blankley G T, Chaum D eds. //Proceedings of the CRYPTO'84. LNCS 196, Springer-Verlag, 1985:48-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the weil pairing//Proceedings of the Cryptology-Crypto 2001. LNCS 2139, Springer-Verlag, 2001:231-229.
  • 4Bellare M, Boldyreva A, Palacio A. An uninstantiable ran- dom-oracle-model scheme for a hybrid-encryption problem// Proceedings of the Cryptology-EUROENCRYPT' 2004. LNCS 3027, Springer-Verlag, 2004:171-188.
  • 5Boneh D, Boyen X. Secure identity based encryption without random oracles//Proceedings of the Cryptology-Crypto 2004. LNCS 3152, Springer-Verlag, 2004:443-459.
  • 6Boneh D, Boyen X. Efficient seleetive-ID identity based encryption without random oracles//Proceedings of the Cryptology-EUROENCRYPT' 2004. LNCS 3027, Springer-Vet lag, 2004:223-238.
  • 7Waters B. Efficient identity-based encryption without random oracles//Proceedings of the Cryptology-EUROENCRYPT'2005. LNCS 3494, Springer-Verlag, 2005 : 114-127.
  • 8Gentry C. Practical identity-based encryption without random oracles//Proceedings of the Cryptology-EUROENCRYPT'2006. LNCS 4004, Springer-Verlag, 2006:445-464.
  • 9Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive hosen Ciphertext//Proceedings of the Cryptology-Crypto' 98. LNCS 1462, SpringerVerlag, 1998:13-25.
  • 10Boneh D. The decision diffie-hellman problem//Proceeding of the 3rd Algorithmic Number Theory Symposium, LNCS 1423, Springer-Verlag, 1998:48-63.

共引文献11

同被引文献46

  • 1Prasad R, Mohr W, Konhauser W. Third generation moble communication system: London, Boston: Artech House, 2000.
  • 2Mitola J, Maquire GJ. Cognitive radios: making software radios more personal. IEEE Personal Communications, 1999, 6 (4): 13 -18.
  • 3Haykin S. Cognitive radio: brain-empowered wireless communications. IEEE JSAC, 2005,23 (2):201-220.
  • 4Clancy TC, Goergen N. Security in cognitive radio networks: threats and mitigation. Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on, Singapore, 15-17 May 2008: 1-8.
  • 5Ruiliang C, Jung-Min P, Reed JH. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 2008, 26(1): 25-37.
  • 6Kyasanur P, Vaidya DN. Selfish MAC layer misbehavior in wireless networks. IEEE Trans. on Mobile Computing, 2005, 4(5):502-516.
  • 7Ma LP, Han XF, Shen CC. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks. Proc. DySPAN, 2005:203- 213.
  • 8Pawelczak P, Prasad RV, Liang X, Niemegeers IGMM.Cognitive radio emergency networks - requirements and design. Proc. DySPAN, 2005: 601- 606.
  • 9Jakobsson M, Wetzel S, Yener B. Stealth attacks on ad hoc wireless networks. Proc. of the VTC. 2003.
  • 10Aad I, Hubaux JP, Knightly EW. Denial of service resilience in ad hoc networks. Proc. of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom'04). 2004: 202-217.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部