期刊文献+

基于SEND协议的安全路由认证机理与方法 被引量:1

Mechanism and method of secure routing authentication based on SEND
下载PDF
导出
摘要 通过对现有路由认证手段进行分析,提出了新的路由认证概念,并设计了3个阶段的安全路由认证算法,重点针对通信路径建立阶段和回溯验证阶段,实现了数据报依预设可信路由传输,并使通信端节点能够通过独立于可信第三方对传输数据报的路由进行核验,获取通信路径上路由器的信息。 The existing method of routing authentication is analyzed and a new concept of routing authentication is proposed. A three-stage secure routing authentication algorithm is designed, especially the one of communication path establishment stage and the back-tracing validation stage, for datagram to be transferred by trusted touters. The communication receiving end nodes can also verify the routers which have transferred the datagram earlier independently without a third party, and obtain the information of routers on the communication path.
作者 范静雯 周亮
出处 《北京信息科技大学学报(自然科学版)》 2015年第2期14-19,共6页 Journal of Beijing Information Science and Technology University
基金 思科系统公司合作项目资助
关键词 路由认证 伪随机序列 安全邻居发现 安全协议 routing authentication pseudo-random sequence secure neighbor discovery secure protocols
  • 相关文献

参考文献10

  • 1Khan F. Secure communication and routing architecture in wireless sensor networks [c]// Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on,2014:647 -650.
  • 2Ghaderi M, Goeckel D, Orda A, et al. Efficient wireless security through jamming, coding and routing [ C ] /J Sensor, Mesh and Ad Hoc Communications and Networks ( SECON ), 2013 10th Annual IEEE Communications Society Conference on, 2013: 505 -513.
  • 3Liu Hongjun, Luo Ping, Wang Daoshun. A distributed expansible authenticationmodel based on Kerberos[J]. Network and Computer Applications, 2008,31 : 472 -486.
  • 4Liu Hongjun, P Luo ing, Wang Daoshun. A scalable authentication model based on public keys [ J ]. Network and Computer Applications, 2008, 31:375-386.
  • 5Giovanni Di Crescenzo. Secure node discovery in ad-hoc networks and applications [ J ]. Electronic Notes in Theoretical Computer Science,2007, 171:43 -55.
  • 6Arkko J Kempf J,Sommerfeld B, et al. SEcure Neighbor Discovery (SEND) [ S/OL]. TETF RFC 3971, March, 2005. http: //www. rfc- editor, org/rfc/rfc3971, txt.
  • 7Narten T, Nordmark E, Simpson W. Neighbor Discovery for IP Version 6 (IPv6) [ EB/OL]. TETF RFC 2461, December, 1998. http: // www. rfc-editor, org/rfc/rfc2461, txt.
  • 8Ahmad A1Sa' deh, Christoph Meinel. Secure neighbor discovery review, challenges, perspectives and recommendations [ J ]. IEEE Security & Privacy, 2012, 10 (4) :26 - 34.
  • 9Neuman C. The Kerberos Network Authentication Service: V5 [ S/OL ]. TETF RFC 4120, July, 2005. http: // www. rfc- editor, org/rfc/rfc4120, txt.
  • 10Rivest R, Yu T, Hartman S, et al. The MD5 Message-Digest Algorithm, TETF RFC 1321, April, 1992.

同被引文献1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部