期刊文献+

基于自验证公钥的安全高效WMNs密钥生成机制 被引量:1

Secure and efficient key generation scheme for WMNs using self-certified public key
下载PDF
导出
摘要 针对无线mesh网络现有的密钥生成机制中,无法实现双向认证、会话密钥协商以及过度消耗节点资源的问题,结合基于椭圆曲线的密码体制和基于自验证公钥的密钥生成方法,提出一种可用于无线mesh网络的密钥生成机制。这种机制避免了密钥托管,可实现通信双方身份认证和会话密钥协商,具有抵抗常见攻击的安全属性。实验及分析表明,相比同类协议,具有更低的计算和通信代价。 In wireless mesh networks,the existing key generation schemes either failed to finish session key and authentication simultaneously or overspend nodes' resources. Based on elliptic curve cryptosystems and self-certified public keys,this paper proposed a new key generation scheme,which could be used in wireless mesh networks. In the scheme,there was no need for key escrow,participants could achieve mutual authentication and session key agreement simultaneously,it also could resist common attacks. The experiment and analysis results indicate that it needs lower communication and computation cost compared with similar protocols.
作者 张青
出处 《计算机应用研究》 CSCD 北大核心 2015年第4期1149-1153,共5页 Application Research of Computers
基金 陕西省科技厅自然科学基础研究计划项目(2010JM2016) 国家教育部人文社科青年基金资助项目(13YJC630195)
关键词 无线MESH网络 密钥协商 自验证公钥 双向认证 wireless mesh networks key agreement self-certified public keys mutual authentication
  • 相关文献

参考文献34

  • 1AKYILDIZ F, WANG Xu-dong, WANG Wei-lin. Wireless mesh net- works: a survey[J]. Computer Networks,2005,47(4) :445-487.
  • 2HU Zhi-yuan, DENG Jian-liang, CHANG Ying-hua,et aL Design and analysis of reliability wireless mesh network [ C ]//Proc of Internatio- nal Conference on Computer Science and Service System. 2011:3128- 3131.
  • 3ALRAYES M, TRIPATHI R, TYAGI N, et al. Enhancement of route maintenance in AODV over hybrid wireless mesh network [ C ]//Prec of the 1 st International Conference on Recent Advances in Information Technology. 2012:276-278.
  • 4LIU Shu-xin, PENG Jian-hua, LIU Cai-xia. Analysis of wireless mesh network security based on node functio'n[ C]//Proc of the 7th Interna- tional Conference on Computational Intelligence and Security. 2011 : 648-652.
  • 5KHAN S, ALRAJEH N A, LOOK K. Secure route selection in wireless mesh networks [ J]. Computer Nelworks,2012,56(2):491-503.
  • 6李丹,葛志辉.基于功率控制和冲突避免的无线Mesh网络低能耗MAC协议[J].计算机应用,2013,33(4):912-915. 被引量:2
  • 7DONG Jing, CURTMOLAB R, NITA-ROTARU C. Secure network coding for wireless mesh networks : threats, challenges, and direc- tions [ J]. Computer Communications ,2009,32 ( 17 ) : 1790-1801.
  • 8AI ISLAM A, RAGHUNATHAN V. End-to-end congestion control in wireless mesh networks using a neural network [ C ]//Pioc of IEEE Wireless Communications and Networking Conference. 2011:677-682.
  • 9VURAL S,WEI D L, MOESSNER K. Survey of experimental evalua- tion studies for wireless mesh network deployments in urban areas to- wards ubiquitous Internet [ J]. IEEE Communications Surveys & Tutorials ,2013,1 5( 1 ) :223-239.
  • 10REDDY K, NALLA D. Identity based authenticated group key agree- ment protocol[ C ]//Progress in Cryptology. 2002:215-233.

二级参考文献40

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2Chi Kuang-hui, Shih Yung-chien, Liu Ho-han, et al. Fast handoff in secure IEEE 802.11s mesh networks. IEEE Transactions on Vehicular Technology, 2011, 60(1): 219-232.
  • 3Li Nan. Research on Diffie-Hellman key exchange protocol. Proceedings of the 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010:634-637.
  • 4Bellare M, Canetti R, Klawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols. Proceedings of the 30th Annual Symposium on the Theory of Computing, New York, USA, 1998:419-428.
  • 5Boneh D. The decision Diffie-Hellman problem. Lecture Notes in Computer Science, 1998(1423):48-63.
  • 6Zhang Fan, Ma Jianfeng, Moon S J, et al. The security proof of a 4-way handshake protocol in IEEE 802.11i. Lecture Notes in Computer Science, 2005(3802): 488-493.
  • 7DIFFIE W, HELLMAN M. New directions in cryptography[ J]. IEEE Transactions on Information Theory, 1976, 22(6): 644 - 654.
  • 8MENEZES A, QU M, VANSTONE S. Some new key agreement pro- tocols providing implicit authentication[ C]// Conference on Selected Areas in Cryptography 1995. Piscataway: IEEE, 1995:22-32.
  • 9ANSI X9.42. Agreement of symmetric algorithm keys using Diffie- Hellman[ S]. IETF, 1998.
  • 10ANSI X 9.63. Elliptic curve key agreement and key transport proto- cols[S]. Piscataway: IEEE, 1998.

共引文献2

同被引文献16

  • 1Anne-Marie Kermarrec,Erwan Le Merrer,Bruno Sericola,Gilles Trédan.??Second order centrality: Distributed assessment of nodes criticity in complex networks(J)Computer Communications . 2010 (5)
  • 2Frank A. Zdarsky,Sebastian Robitzsch,Albert Banchs.??Security analysis of wireless mesh backhauls for mobile networks(J)Journal of Network and Computer Applications . 2010 (2)
  • 3Szott S.Selfish insider attacks in ieee 802.11s wireless mesh networks. IEEE Communications Magazine . 2014
  • 4Butun,I,Morgera,S.D.,Sankar,R.'A Survey of Intrusion Detection Systems in Wireless Sensor Networks,'. Communications Surveys & Tutorials,IEEE . 2014
  • 5Okechukwu E. Muogilim,Kok-Keong Loo,Richard Comley.Wireless mesh network security: A traffic engineering management approach. Journal of Network and Computer Applications . 2011
  • 6Chen W,Yuan Y,Zhang L.Scalable influence maximization insocial networks under the linear threshold model. The 2010IEEE International Conference on Data Mining (ICDM) . 2010
  • 7N. Deb,M. Chakraborty,N. Chaki.The Evolution of IDS Solutions in Wireless Ad-Hoc Networks to Wireless Mesh Networks. Network Security & Applications . 2011
  • 8Yao Yu,Lei Guo,Xingwei Wang,Cuixiang Liu.??Routing security scheme based on reputation evaluation in hierarchical ad hoc networks(J)Computer Networks . 2009 (9)
  • 9Zorana Bankovic,David Fraga,José Manuel Moya,Juan Carlos Vallejo,Pedro Malagón,álvaro Araujo,Juan-Mariano de Goyeneche,Elena Romero,Javier Blesa,Daniel Villanueva,Octavio Nieto-Taladriz.??Improving security in WMNs with reputation systems and self-organizing maps(J)Journal of Network and Computer Applications . 2010 (2)
  • 10Yao Yu,Yuhuai Peng,Yinpeng Yu,Tianyu Rao.??A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks(J)Computers and Electrical Engineering . 2014 (2)

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部