期刊文献+

无线Ad Hoc网络中一种分布式密钥安全管理方法 被引量:1

A Security Private Key Distribution Management Method in Wireless Ad Hoc Networks
下载PDF
导出
摘要 Ad Hoc无线网络是一种自组织移动网络,其中节点是通过不直接连接的中间节点来进行传输。无线网络是非常敏感的,攻击范围可以是被动的偷听,也可以是主动的干预,提供安全支持是一个挑战任务。论文提出了一种分布式密钥安全管理方法,这个方法是选择利他节点,并通过邻居观察完成(k,n)门限密钥,形成强密钥保护避免选择功利性强的节点。本方法对非信任的Ad Hoc网络是十分有效的,避免了k-1对手通过密钥获得信息。 An Ad Hoc wireless network is an autonomous self-organizing system of mobile nodes connected by wireless links where un- directly connected nodes can communicate via intermediate nodes. Providing security support is a challenging task because wireless networks are susceptible to be attacked ranging from passive eavesdropping to active interference. In this paper, a private key distribution management method is presented for wireless Ad Hoc network. The protocol is based on selecting altruism nodes and avoiding utilitarianism nodes by neighbor's observation to performed (k,n) threshold cryptography for the strong private key protection. The protocol is efficient for an un- trustworthy Ad Hoe network, also prevents a k-1 adversaries from gaining information about the secret private key.
作者 吴祝
出处 《计算机与数字工程》 2013年第6期968-969,989,共3页 Computer & Digital Engineering
关键词 安全 AD HOC网络 无线 security Ad Hoc network wireless
  • 相关文献

参考文献10

  • 1Yih-Chun Hu, Adrian Perrig, David B. Hohnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoe Networks [C]//Proc. Of the Eight ACM International Conference on Mobile Computing and Networking(MobiCom 2002), ACM, Atlanta, GA, 2008:12-23.
  • 2Sonja Buehegger, Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoe Networks[C]//Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2009. IEEE Computer Society, 2009 : 403-410.
  • 3Erik Warren Selberg. How to Stop a Cheater: Secret Sharing with Dishonest Participation. October 18, 2010, CMU-CS-98 182 School of Computer Science Carnegie Mellon University PA 15213.
  • 4Hao Yang, Xiaoqiao Meng, Songwu Lu. Self- Organized Net- work Layer Security in Mobile Ad Hoc Networks[C]//ACM MOBICOM Wireless Security Workshop(WiSe'02), Atlanta, 2009,9.
  • 5Jiejun Kong, Petros Zerfos, Haiyun Luo, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Net works[C]//IEEE ICNP(International Conference on Network Protocols) 2001, Riverside, CA, 2008,11.
  • 6Sonja Buchegger, Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT protocol(Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks)[C]//Proceedings of IEEE/ ACM Workshop on Mobile Ad Hoc Networking and Computing(MOBIHOC 2002), EPFL Lausanne, Switzerland, 2007, 6:9-11.
  • 7Berry Schoenmakers. A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting[C]//in Advances in Cryptology - CRYPTO'99, Vol. 1666 of Lecture Notes in Computer Science, Springer-Verlag, 2008 : 148-164.
  • 8Theodore M. Wong, Chenxi Wang, Jeannette M. Wing. Verifiable Secret Redistribution for Threshold Sharing Schemes. CMU-CS-02-114 School of Computer Science Carnegie Mellon University PA 15213,2009,2.
  • 9冯成旭,刘忠,程远国.一种基于RSSI的无线传感器网络的改进定位算法[J].舰船电子工程,2010,30(10):69-71. 被引量:19
  • 10张星,严承华.基于PMI的Web安全访问控制系统设计[J].舰船电子工程,2009,29(8):155-157. 被引量:8

二级参考文献9

共引文献25

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部