期刊文献+

基于双线性的船舶自组网安全机制研究

Research on the Security Mechanism of Ship Ad Hoc Networks Based on Bilinearity
下载PDF
导出
摘要 由于船舶自组网是一个涉及多行业、多部门、跨地域的复杂项目,必然涉及到业务整合和数据协同,这使得提高船舶自组网络的安全性和效率变得十分重要。考虑到在船联网中发起认证识别的频率不是很高,基于单向密钥链的ID认证防御机制(OKCIDA),降低攻击者不分时间段发起攻击的可能性。并基于椭圆曲线离散对数问题(ECDLP),在邻居发现的基础上,提出一种基于双线性的认证签名方案(BASS),以丢弃无效信息并阻止攻击节点加入网络。分析表明,该方案在邻居认证、消息签名、访问控制方面能够保证通信的安全性,而且无效节点剔除能够提高节点间的通信效率。最后,将方案的复杂度与延时分别与同类型协议进行对比。实验结果表明,该方案具有一定的优势。 As the ship network is a multi-sector,multi-sectoral,cross-regional complex projects,will inevitably involve business integration and data collaboration,which makes the improvement of the ship's network security and efficiency becomes very important.Considering that the initiation of neighbor certification in the ship network is infrequent,an ID authentication defense mechanism(OKCIDA)based on the oneway key chain is adopted to reduce the possibility of an attacker attacking at any time.Then,based on the elliptic curve discrete logarithm problem(ECDLP),proposes a bilinear-based authentication signature scheme(CDT)based on the discovery of neighbors to discard invalid information and prevent attack nodes from joining the network.The analysis shows that the scheme can guarantee the security of communication in terms of neighbor authentication,message signature and access control,and invalid node elimination can improve the communication efficiency between nodes.Finally,the complexity and delay of the scheme are compared with the same type of protocol.The experimental results show that the scheme has certain advantages.
作者 常丹婷 CHANG Dan-ting(College of Information Engineering,Shanghai Maritime University,Shanghai 201306)
出处 《现代计算机(中旬刊)》 2018年第7期3-8,共6页 Modern Computer
基金 中国博士后科学基金资助项目(No.2014M561512) 国家自然科学基金资助项目(No.61202370)
关键词 船联网 邻居认证 消息签名 单向密钥链 Ship Network Neighbor Authentication Message Signature One-Way Key Chain
  • 相关文献

参考文献4

二级参考文献66

  • 1徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3顾纯祥,祝跃飞,潘晓豫.Forking引理与一类基于身份签名体制的安全性证明(英文)[J].软件学报,2007,18(4):1007-1014. 被引量:4
  • 4Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 5Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 6Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11.
  • 7Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47.
  • 8Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71.
  • 9Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213.
  • 10Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13.

共引文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部