期刊文献+

无线Mesh网络轻量级容侵CA方案 被引量:2

Scheme of Lite and Tolerant Certification Authority for Wireless Mesh Network
下载PDF
导出
摘要 为解决公钥体制过于复杂而难以在资源受限的无线环境中布署的问题,结合轻量级CA(Certification Authority)概念、(t,n)门限机制和椭圆曲线离散对数公钥体制,构建一个适用于无线Mesh网络的轻量型容侵LT-CA(Lite Tolerant CA)方案。分析表明,LT-CA简化了传统基于证书CA公钥产生、验证及管理的复杂性,具有公钥产生轻量化、公钥验证轻量化、无需证书管理的特点;在没有显著增加系统复杂性的情况下,采用门限机制使LT-CA私钥具有容侵能力,可抵御无线环境下易于实施的多种攻击。 In order to solve the problems of complex public key cryptography which is difficult to implement in a re- source-constrained wireless environments, a lite and tolerant CA(LT-CA) infrastructure was proposed which combines threshold mechanism with the idea of lite-CA(Certification authority) and ellipse curve cryptograph(ECC) public key mechanism. Comparing LT-CA with traditional Certification-based CA system, analysis shows LT-CA reduces the com- plications of producing and verifying public keys by generating public/private keys more flexibly and conveniently and it has the added benefit that it is certificateless. Moreover, LT-CA' s private key possesses the ability of intrusion tolerance without obviously increasing the cost of system computing and payloads, and LT-CA can effectively defend against at- tacks that are known to occur in wireless environments.
出处 《计算机科学》 CSCD 北大核心 2013年第12期200-204,232,共6页 Computer Science
基金 国家科技部创新基金项目(10C26216205256) 中国气象局项目([2013]069)资助
关键词 无线MESH网络 椭圆曲线密码 门限机制 轻量级CA Wireless mesh network, Ellipse curve cryptograph, Threshold mechanism, Lite-CA
  • 相关文献

参考文献19

  • 1Qi Ji, Zhao Yi, Wang Xing-ming, et al. Security authentication and an undeniable billing protocol for WMNs[C]//Sterritt R. Proceedings of International Conference on Cyber-Enabled Dis- tributed Computing and Knowledge Discovery. Huang Shan, China: IEEE Publisher, 2010 : 266-269.
  • 2Durahim A O, Savas E. A2-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs[J7. Ad Hoc Networks, 2011,9(5) : 1202-1220.
  • 3Boudguiga A, Lauren URENT M. Key-escrow resistant ID- based authentication scheme for IEEE 802. lls Mesh Networks [C] Kingston D. Proceedings of IEEE Wireless Communica- tions and Networking Conference (WCNC). Quintana Roo, Mexico: IEEE Publisher, 2011 : 784-789.
  • 4Sharnir A. How to share a secret [J]. Communications of the ACM, 1979,22(11) : 612-613.
  • 5Blakley G R. Safeguarding cryptographie keys[C]///Smith M. Proceedings of the National Computer Conference. New York, USA: IEEE Publisher, 1979 : 313 -317.
  • 6Kim J, Bahk S. Design of certification authority using secret re- distribution and multicast routing in wireless mesh networks [J]. Computer Networks, 2009,53 (1) : 98-109.
  • 7Yang Kan, Jia Xiao-hua, Zhang Bo, et al. Threshold key redistri- bution for dynamic change of authentication group in Wireless Mesh Networks [ C] // LIANG J. Proceedings of IEEE Global Telecommunications. Miami, USA: IEEE Publisher, 20]0:1156- 1151.
  • 8Chai Zhen-chuan, Cao Zhen--fu, Lu Rong-xing. Threshold pass- word authentication against guessing attacks in Ad hoe net-works[J]. Ad-hoc Networks, 2007,5(7) :1046-1054.
  • 9Dong Xiao-lei, Wang Li-cheng, Cao Zhen-fu. New public key cryptosystems with lite certification authority[EB/OL], http.-// ePrint, iacr. org/2006/154,2013-3-16.
  • 10潘耘,王励成,曹珍富,李剑.基于轻量级CA的无线传感器网络密钥预分配方案[J].通信学报,2009,30(3):130-134. 被引量:19

二级参考文献11

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2GAUBATZ G, KAPS J, SUNAR B. Public keys cryptography in sensor networks-revisited[A]. Proc of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS)[C]. New York, 2004. 2-18.
  • 3MALAN D J, WELSH M, SMITH M D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[A] Proc of the 1st IEEE Int'l Conf on Sensor and Ad Hoc Communications and Networks[C]. 2004. 71-80.
  • 4HUANG Q, CUKIER J, KOBAYASHI H, et al. Fast authenticated key establishment protocols for self-organizing sensor networks[A]. Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications[C]. San Diego, CA, USA, 2003. 141-150.
  • 5KOTZANIKOLAOU E MAGKOS E, DOULIGERIS C, et al. Hybrid key establishment for multiphase self-organized sensor networks[A]. Proc of the 6th IEEE Int'l Symp on a World of Wireless Mobile and Multimedia Networks [C]. Washington, 2005.581-587.
  • 6RFC 2459[EB/OL]. http://www.ietf.org/rfc/rfc2459.txt.
  • 7AL-RIYAMI S S, PATERSON K G, Certificateless public key cryptography[A]. Advances in Cryptology-AsiaCrypt'03[C]. Springer, 2003.452-473.
  • 8DONG X, WANG L, CAO Z. New public key cryptosystems with lite certification authority[EB/OL], http://ePrint.iacr.org/2006/154.
  • 9KOHNFELDER L M. Towards a Practical Public Key Cryptosystem[D]. MIT Department of Electrical Engineering, 1978.
  • 10SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology-CRYPTO'84[C]. Springer, 1985.47-53.

共引文献18

同被引文献24

  • 1季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 2CHENG Hong-bing,YANG Geng,WANG Jiang-tao,HUANG Xiao.An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):31-38. 被引量:8
  • 3Gura N,Patel A,Wander A,et al.Comparing Elliptic CurveCryptography and RSA on 8bit CPUs[J].CHES,2004(8):11-13.
  • 4Hill J,Szewczyk R,Woo R,et al.System Architecture Directions for Networked Sensors[C]∥Proceeding of Architectural Support for Programming Languages and Operating Systems.Quintana Roo,USA:IEEE Publisher,2000:93-104.
  • 5Malan D J,Welsh M,Smith M D.Implementing Public-Key Infrastructure for Sensor Networks [J].ACM Transactions on Sensor Networks,2008,4(4):1-23.
  • 6Levis P,Madden S,Polastre J,et al.TinyOS:An operating system for sensor networks [EB/OL].2004-6-18[2014-7-9].http://www.cs.berkeley.edu/~culler/AIIT/papers/TinyOS/levis06tinyos.pdf.
  • 7Watro R,Kong D,Sue F C,et al.TinyPK:Securing Sensor Networks with Public Key Technology[C]∥Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.Miami,USA:IEEE Publisher,2004:59-64.
  • 8Benenson Z,Gedicke N,Raivio O.Realizing Robust User Au-thentication in Sensor Networks[C]∥Proceedings of Workshop on Real-World Wireless Sensor Networks.LNSC4582, Palma de Mallorca,Spain:Springer-Verlag,2005:556-566.
  • 9Zhou Y,Zhang Y,Fang Y.Access Control in Wireless Sensor Networks [J].Ad hoc Networks,2007(5):3-13.
  • 10Oliveira L B,Dahab R,Lopez J.Identity-Based Encryption forSensor Networks[C]∥Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.San Francisco,USA:IEEE Publisher,2012:290-294.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部