期刊文献+

Lightweight Trusted Security for Emergency Communication Networks of Small Groups

Lightweight Trusted Security for Emergency Communication Networks of Small Groups
原文传递
导出
摘要 Public communication infrastructures are susceptible to disasters. Thus, the Emergency Communication Networks(ECNs) of small groups are necessary to maintain real-time communication during disasters. Given that ECNs are self-built by users, the unavailability of infrastructures and the openness of wireless channels render them insecure. ECN security, however, is a rarely studied issue despite of its importance. Here, we propose a security scheme for the ECNs of small groups. Our scheme is based on the optimized Byzantine Generals’ Problem combined with the analysis of trusted security problems in ECNs. Applying the Byzantine Generals’ Problem to ECNs is a novel approach to realize two new functions, debugging and error correction, for ensuring system consistency and accuracy. Given the limitation of terminal devices, the lightweight fast ECDSA algorithm is introduced to guarantee the integrity and security of communication and the efficiency of the network. We implement a simulation to verify the feasibility of the algorithm after theoretical optimization. Public communication infrastructures are susceptible to disasters. Thus, the Emergency Communication Networks(ECNs) of small groups are necessary to maintain real-time communication during disasters. Given that ECNs are self-built by users, the unavailability of infrastructures and the openness of wireless channels render them insecure. ECN security, however, is a rarely studied issue despite of its importance. Here, we propose a security scheme for the ECNs of small groups. Our scheme is based on the optimized Byzantine Generals' Problem combined with the analysis of trusted security problems in ECNs. Applying the Byzantine Generals' Problem to ECNs is a novel approach to realize two new functions, debugging and error correction, for ensuring system consistency and accuracy. Given the limitation of terminal devices, the lightweight fast ECDSA algorithm is introduced to guarantee the integrity and security of communication and the efficiency of the network. We implement a simulation to verify the feasibility of the algorithm after theoretical optimization.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第2期195-202,共8页 清华大学学报(自然科学版(英文版)
关键词 emergency communication networks of small groups optimized Byzantine Generals' Problem fast ECDSA lightweight trusted security scheme based on Byzantine Generals' Problem emergency communication networks of small groups optimized Byzantine Generals' Problem fast ECDSA lightweight trusted security scheme based on Byzantine Generals' Problem
  • 相关文献

参考文献3

二级参考文献21

  • 1KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Compution American Mathematical Society, 1987(48): 203-309.
  • 2MILLER V. Use of elliptic curves in cryptography[A]. Advance in Cryptology-Proceedings of CRYPTO 1985, Lecture Notes in Computer Science[C]. Springer, 1986. 417-426.
  • 3MONTGOMERY P L. Speeding the pollard and elliptic curve methods of factorizations[J]. Math. Comp, 1987, 48: 243-264.
  • 4MONTGOMERY P L. Modular multiplication without trial division[J]. Mathematics of Computation, 1985, 44(170): 519-521.
  • 5LOPEZ J, DAHAB R. Fast Multiplication on elliptic curves over GF(2^m) without precomputation[A]. Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems[C]. London, UK: Springer Verlag, 1999.316-327.
  • 6OKEYA K, SAKURAI K. Use of Montgomery trick in precomputation of multi-scalar multiplication in elliptic curve cryptosystems[J]. IFACE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2003,86(1): 98-112.
  • 7IZU T. Elliptic curve exponentiation for cryptosystem[A]. SCIS'99[C]. 1999.275-280.
  • 8OKEYA K, SAKURAI K. A scalar multiplication algorithm with recovery of y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystem[J]. IEICE Trans Fundamental, 2002, 85(1): 84-93.
  • 9OKEYA K, KURUMATANI H, SAKURA K. Elliptic curves with the montgomery-form and their cryptographic applications[A]. Public Key Cryptography (PKC2000), LNCS1715[C]. 2000. 238-257.
  • 10FUTA Y, OHMORI M. Efficient scalar Multiplication on Montgomery-form elliptic curves[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004,87(8): 2126- 2136.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部