期刊文献+

高效的无线网络组密钥管理方案

An Efficient Group Key Management Scheme for Wireless Networks
原文传递
导出
摘要 为了满足无线网络组播通信的安全,提出一种适用于多跳环境的高效组密钥管理方案。将代理重加密扩展到多跳的无线网络环境中,从而不需要可信的密钥分配中心;在子组的通信中,采用多接收方加密算法,充分利用了无线通信的广播特性,提高了运算效率,大大减少了通信代价。安全分析和效率分析表明,该方案不仅满足前向安全性和后向安全性,而且有效降低了通信复杂度、存储开销和计算量。 For secure group communication in wireless networks, an efficient group key management scheme suited for multi-top environment is proposed. Use a proxy re-encryption to multi-hop environment,and then develop a distributed protocol for key distribution;in local group communication,use multi-recipients encryption to broadcast key information and reduce communication cost. Through analyzing the proposed scheme with the previous schemes, the result indicates that the proposed scheme can not only satisfy the forward security and backward security, but also has advantages with regard to the rekeying cost, storage overhead and computation efficiency.
作者 王尚顺
出处 《武警工程大学学报》 2016年第2期56-59,共4页 Journal of Engineering University of the Chinese People's Armed Police Force
关键词 组密钥管理 代理重加密 多接收方加密 group key management proxy re-encrypiton multi-recipient encryption
  • 相关文献

参考文献6

  • 1Singh U P,Rathore R S. An Efficient Distributed Group KeyManagement Using Hierarchical Approach with ECDH andSymmetric Algorithm [J]. Computer Engineering and Intelli-gent Systems, 2012,3(7): 32-41.
  • 2Niu Q. ECDH-based Scalable Distributed Key ManagementScheme for Secure Group Communication [J]. Journal ofComputers* 2014, 9(1) : 153-160.
  • 3Guo C,Chang C C. An Authenticated Group Key Distribu-tion Protocol Based on the Generalized Chinese RemainderTheorem [J], International Journal of Communication Sys-tems, 2014, 27(1): 126-134.
  • 4Hur J ?Shin Y. Decentralized Group Key Management for Dy-namic Networks Using Proxy Cryptography [C]//Interna-tional Workshop on Modeling Analysis and Simulation ofWireless and Mobile Systems. New York- ACM, 2007 : 123-129.
  • 5郑明辉,周慧华,宋庆燕.KPET:一种新的可扩展组密钥管理协议[J].武汉大学学报(理学版),2014,60(6):513-517. 被引量:2
  • 6Giuseppe A, Kevin F? Matthew G, etal. Improved Proxy re-encryption Schemes with Applications to Secure DistributedStorage [J]. ACM Transactions on Information and SystemSecurity (TISSEC),2006’ 9(1): 1-30.

二级参考文献9

  • 1Cain B,Deering S,Kouvelas I,et al.Internet group management protocol(IETF RFC 3376)(version 3)[R/OL].[2014-02-01].http://tools.ietf.org/html/rfc3376.
  • 2Zheng M H,Zhou H H,Li J,et al.Efficient and provably secure password-based group key agreement protocol[J].Computer standards and Interfaces,2009,31(5):948-953.
  • 3Harney H,Muckenhirn C.Group Key Management Protocol(GKMP)Specification(IETF RFC 2093)[R/OL].[2014-02-09].http://tools.ietf.org/html/rfc2093.
  • 4Wong C K,Gouda M,Lam S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16-30.
  • 5Wallner D,Harder E,Agee R.Key management for multicast:Issues and architectures[R/OL].[2014-02-03].http://tools.ietf.org/html/rfc2627.
  • 6Mittra S.Iolus:A framework for scalable secure multicasting[C]//Proceedings of ACM SIGCOMM,New York:ACM Press,1997:277-288.
  • 7Wang H,Zhang Y.On the security of a ticket-based anonymity system with traceability property in wireless mesh networks[J].IEEE Transactions on Dependable and Secure Computing,2013,5(14):1-12.
  • 8Yang W H,Fan K W,Shieh S P.A secure multicast protocol for the Internet’s multicast backbone[J].ACM/PH International Journal Network Management,2001,11:129-136.
  • 9Nogueira M,Silva H,Santos A,et al.A security management architecture for supporting routing services on WANETs[J].IEEE Transactions on Network and Service Management,2012,3(8):1-13.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部