期刊文献+

低速率移动自组织网络安全路由协议 被引量:1

Study of Security Routing Protocol for the Low-Rate Mobile Ad Hoc Networks
下载PDF
导出
摘要 由于移动Ad Hoc网络具有无需基础设施,可以快速部署,很难完全被摧毁等优点,被作为数字化战场通信的优先选择,设计实现了一种适用于低速率移动Ad Hoc网络的安全路由协议——LSRP,它适用于分层架构的低速移动电台自组网,可以在网络资源有限的情况下,防御来自外部和内部两方面的攻击。LSRP协议利用分布式门限RSA签名方案来阻止非授权接入,防范来自网络外部的攻击;利用邻节点信任度评估机制,进行恶意节点检测和剪除,防范来自网络内部的攻击,增强了网络的安全性。 With advantages in many respects,such as without infrastructure,rapidly deployed and hard to be totally destroyed,Mobile Ad Hoc Networks have been the first choice for digital battlefield communications. The LSRP protocol,which is a constructive safe routing protocol for the low-rate Mobile Ad Hoc Networks,has been proposed and implemented in this thesis. The protocol can defend attacking from outside and inside with limited network resource. In order to increase the security of LSRP,the distributed threshold RSA signature scheme is imposed to prevent unauthorized access, avoiding the attacks from outside of the network. In addition,in order to detect the attacks from inside of the cluster and,the trust evaluation between neighbor nodes has been brought into LSRP for detecting and purging the malicious nodes. The security of LSRP protocol has been greatly enhanced.
出处 《火力与指挥控制》 CSCD 北大核心 2014年第9期147-151,共5页 Fire Control & Command Control
关键词 移动AD HOC网络 电台自组网 路由协议 节点信任度评估 mobile Ad hoc networks self-organized radio networks routing protocols node trust evaluation
  • 相关文献

参考文献9

  • 1Bobba R B, Eschenauer L, Gligor V, et al.Bootstrapping Secu- rity Associations for Routing in Mobile Ad- Hoc Network [ C ] //Global Telecommunications Conference, 2003.
  • 2宇宏毅.无线移动自组织网[M].北京:人民邮电出版社,2005.
  • 3Damgard I, Koprowski M. Practical Threshold RSA Signa-tures without a Trusted Dealer Lecture Notes [ J ]. Computer Science, 2001 : 1221-1224.
  • 4Avoine G, Oechslin P RPRF, Switzerland L.A Scalable and Probably Secure Hash-Based RFID Protocol [J ]. IEEE Per- sec 2005 : 235-239.
  • 5Bicakci K, Baykal N. Infinite Length Hash Chains and Their Applications,Middle Rast Technical Univemity Informatics Institute [J].WETICE, 2002:57-61.
  • 6王先培,张爱菊,熊平,张俊.新一代数据加密标准——AES[J].计算机工程,2003,29(3):69-70. 被引量:31
  • 7Thomas J, Elbirt A J. Understanding Internet Protocol Securi- ty, Electrical and Computer Engineering Department[ J ]. U- niversity of Massachusetts Lowell, the (ISC) 2 Journal, 2004, 13 ( 4 ) : 39-43.
  • 8Lik M, Mojdeh M, Ari H. A Commputational Model of Trust and Reputation, In Proc. of the 35th Annual Hawaii Interna- tional Conference on System Science [ M ]. Big Island, HI, USA. 2002:7-10.
  • 9李俊,崔国华,郑明辉.移动自组网络安全分布式组密钥管理方案[J].小型微型计算机系统,2007,28(6):991-997. 被引量:6

二级参考文献18

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 3朱文余 孙琦.计算机密码应用基础[M].北京:科学出版社出版,1999..
  • 4Bruschi D,Rosti E.Secure multicast in wireless networks of mobile hosts:protocols and issues.MONET,2000,7(6):503-511.
  • 5Moyer M J,Rao J R,Rohatgi P.A survey of security issues in multicast communications[J].IEEE Network Magazine,1999,13(6):12-23.
  • 6Wallner D,Harder E,Agee R.Key management for multicast:issues and architectures[S].RFC 2627,Internet Engineering Task Force,1999.http://www.rfc-archive.org.
  • 7Amir Y,Ateniese G,Hasse D,et al.Secure group communication in asynchronous networks with failures:integration and experiments[C].IEEE ICDCS 2000,Los Alamitos,CA:IEEE Computer Society Press,2000,330-343.
  • 8DeCleene B,et al.Secure group communications for wireless net-working environments[Z].MILCOM,McLean,Virginia,2001.
  • 9Gennaro R,Jarecki S,Krawczyk H,et al.Secure distributed key generation for discrete log based cryptosystem[C].In:Eurocrypt'99,1999,295-310.
  • 10Shamir A.How to share a secret[J].Communications of the ACM,1979,24(11):612-613.

共引文献35

同被引文献9

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部