期刊文献+

MANET中的可信路由匿名通信方法

Anonymous Communication Method of MANET's Trusted Routing
原文传递
导出
摘要 目前,MANET已经广泛应用于军事、抢险救灾、小型会议等用途。由于MAENT其节点移动性高、网络拓扑变化快等特点,一般应用于无线网络中的安全路由算法并不能很好地解决其路由安全的问题,故其安全路由算法一直是研究的热点。在实际需求中,MANET安全路由算法往往需要满足强安全性、快速链接、匿名通信等要求,而现今的大多数研究更仅侧重于安全性方面的讨论。文中结合可信计算的内容,提出了一种新颖的安全路由算法TAAODV(Trusted Anonymous AODV)。该算法基于AODV(ad-hoc on-demand distance vector routing)算法,引入可信计算,使用伪名来进行匿名通信,在节点间的认证环节引入零知识证明、环签名等方法,并且不需要在线的可信第三方。经过仿真验证,该算法可以抵御大多数已知的攻击方法,并且相较AODV,所额外耗费的资源并不多,满足快速连接的需求。 Nowadays,MANET is widely used in military,disaster relief,small meetings and so on. Since MANET has high node mob-ility and quick changes of network topology,the secure routing algorithm applied in normal wireless networks couldn't fairly solve the security problems of MANET's routing,and thus MANET's secure routing algorithm becomes a research hotspot. In actual demand,MA-NET routing algorithms are often reqired to meet strong security,quick links and anonymous communication,and however the current studies merely focus on security concerns. In combination of trusted computing,a novel secure routing algorithm TAAODV( Trusted A-nonymous AODV) is proposed. Based on AODV(ad-hoc on-demand distance vector routing) algorithm,this proposed algorithm in-corporates trusted computing and realizes anonymous communication,and by introducing zero-knowledge proof and ring signature into node certification,requires no online TA. Simulation indicates that this algorithm can resist most known attack methods,and compared with AODV,it could satisfy the demands of fast connections without much additional cost of resources.
作者 徐劢 王剑
出处 《信息安全与通信保密》 2014年第9期90-93,共4页 Information Security and Communications Privacy
关键词 MANET 可信计算 AODV 匿名通信 MANET trusted computing AODV anonymous communication
  • 相关文献

参考文献10

  • 1Yih-Chun Hu,Adrian Perrig,David B. Johnson.Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks[J]. Wireless Networks . 2005 (1-2)
  • 2Yih-Chun Hu,David B. Johnson,Adrian Perrig.SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks[J]. Ad Hoc Networks . 2003 (1)
  • 3Manel Guerrero Zapata.Secure ad hoc on-demand distance vector routing[J]. ACM SIGMOBILE Mobile Computing and Communications Review . 2002 (3)
  • 4JARRETT M,WARD P,SOCIETY I C.Trusted Computing for Protecting Ad-hoc Routing. Communication Networks and Services Research Conference (CNSR 2006) . 2006
  • 5Vinay Thotakura,Mahalingam Ramkumar.Minimal Trusted Computing Base for MANET Nodes. International Conference on Wireless and Mobile Computing,Networking and communications . 2010
  • 6Kevin Lai Sergio Marti,Giuli T J,Mary Baker.Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of 6th Annual International Conference on Mobile Computing and Networking(MOBICOM’00) . 2000
  • 7Pietro Michiardi,Refik Molva.Core:a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security . 2002
  • 8Sanzgiri, Kimaya,LaFlamme, Daniel,Dahill, Bridget,Levine, Brian Neil,Shields, Clay,Belding-Royer, Elizabeth M.Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications . 2005
  • 9Wenchao Huang,,Yan Xiong,Depin Chen."DAAODV: A Secure Ad-hoc Routing Protocol based onDirect Anonymous Attestation". International Conference on Computational Science and Engineering . 2009
  • 10Rivest R L,Shamir A,Tauman Y.How to Leak a Secret. Advances in Cryptology-Asiacrypt 2001 . 2001

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部