期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
A Layer-Cluster Key Agreement Protocol for Ad Hoc Networks
1
作者 章丽平 崔国华 +2 位作者 雷建云 许静芳 卢社阶 《Journal of Southwest Jiaotong University(English Edition)》 2008年第4期346-351,共6页
Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually lo... Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually low power devices that run on battery power. As a result, the costs of the node resources should be minimized when constructing a group key agreement protocol so that the battery life could be prolonged. To achieve this goal, in this paper we propose a security efficient group key agreement protocol based on Burmester-Desmedt (BD) scheme and layer-cluster group model, referred to as LCKM-BD, which is appropriate for large mobile ad hoe networks. In the layer-cluster group model, BD scheme is employed to establish group key, which can not only meet security demands of mobile ad hoc networks but also improve executing performance. Finally, the proposed protocol LCKM-BD are compared with BD, TGDH (tree-based group Diffe-Hellman), and GDH (group Diffie-Hellman) group key agreement protocols. The analysis results show that our protocol can significantly decrease both the computational overhead and communication costs with respect to these comparable protocols. 展开更多
关键词 ad hoe networks Group key agreement BD Layer-cluster security COMPLEXITY
下载PDF
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography 被引量:1
2
作者 Krishnan Kumar J. Nafeesa Begum V. Sumathy 《International Journal of Communications, Network and System Sciences》 2010年第4期369-379,共11页
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group... This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost. 展开更多
关键词 ad hoc network Region-Based GROUP key agreement Protocol ELLIPTIC CURVE DIFFIE-HELLMAN Tree-Based GROUP ELLIPTIC CURVE DIFFIE-HELLMAN
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
3
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
A More Efficient Group Key Distribution Scheme for Wireless Ad hoc Networks
4
作者 李晖 陈克非 +1 位作者 温蜜 郑燕飞 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期64-66,共3页
As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless app... As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless applications. A new self-healing key distribution scheme was proposed, which is optimal in terms of user memory storage and efficient in terms of communication complexity. 展开更多
关键词 group key ad hoc network security
下载PDF
A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
5
作者 B.Moussakhani S.M.Safavi H.Ebrahimzad 《China Communications》 SCIE CSCD 2007年第1期40-47,共8页
Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malic... Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malicious behaviors can disturb routing process.We present the design and performance evaluation of a new secure on-demand routing protocol for ad hoc networks, called CASR.CASR is robust against attackers from outside of the network and even it prevents compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes.Because of using symmetric cryptography in its structure,CASR is robust against large number of types of Denial-of -Service attacks.However,due to the applying of the random key predistributions method to the routing process our proposed scheme reaches a trade-off between the degree of security and complexity. 展开更多
关键词 ad hoc networks routing security CRYPTOGRAPHY random key predistributions
下载PDF
A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks
6
作者 Abdesselem Beghriche Azeddine Bilami 《International Journal of Intelligent Computing and Cybernetics》 EI 2018年第2期309-340,共32页
Purpose–Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks(MANETs).In such systems,the cooperation between nodes is one of the important principles being ... Purpose–Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks(MANETs).In such systems,the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols.Many existing works assume that mobile nodes will follow prescribed protocols without deviation.However,this is not always the case,because these networks are subjected to a variety of malicious attacks.Since there are various models of attack,trust routing scheme can guarantee security and trust of the network.The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.Design/methodology/approach–The proposed model incorporates the concept of trust into the MANETs and applies grey relational analysis theory combined with fuzzy sets to calculate a node’s trust level based on observations from neighbour nodes’trust level,these trust levels are then used in the routing decision-making process.Findings–In order to prove the applicability of the proposed solution,extensive experiments were conducted to evaluate the efficiency of the proposed model,aiming at improving the network interaction quality,malicious node mitigation and enhancements of the system’s security.Originality/value–The proposed solution in this paper is a new approach combining the fundamental basics of fuzzy sets with the grey theory,where establishment of trust relationships among participating nodes is critical in order to enable collaborative optimisation of system metrics.Experimental results indicate that the proposed method is useful for reducing the effects of malicious nodes and for the enhancements of system’s security. 展开更多
关键词 security Grey relational analysis Fuzzy set Misbehaviour Mobile ad hoc networks Trust model
原文传递
Ad Hoc网络中基于身份的簇密钥协商机制 被引量:3
7
作者 刘雪艳 张强 王彩芬 《计算机应用》 CSCD 北大核心 2012年第8期2258-2261,2327,共5页
针对Ad Hoc网络能源受限、动态变化的特性,提出一个基于身份的组密钥协商机制。该机制基于簇结构,允许同步执行基于对的多方密钥协商协议,从而使得簇成员数不影响密钥协商;密钥协商期间不需要交互,进而提供安全认证和动态性。在判定性... 针对Ad Hoc网络能源受限、动态变化的特性,提出一个基于身份的组密钥协商机制。该机制基于簇结构,允许同步执行基于对的多方密钥协商协议,从而使得簇成员数不影响密钥协商;密钥协商期间不需要交互,进而提供安全认证和动态性。在判定性双线性Diffie-Hellman(DBDH)问题下证明了该机制的语义安全性,并与已有方案在安全性、通信量和计算量方面进行了比较,结果表明所提机制在协商轮数和认证性方面具有优势。 展开更多
关键词 ad hoc网络 密钥协商 认证 安全性
下载PDF
一种新的移动Ad Hoc网络会话密钥协商协议 被引量:3
8
作者 麻晓园 李云 陈前斌 《计算机应用》 CSCD 北大核心 2004年第1期82-83,共2页
文章在移动AdHoc网络环境下 ,以节点公钥证书为基础 ,提出了一个安全的会话密钥协商协议 ,使得非法节点无法获知通信内容 ,有效地保证了移动AdHoc网络的通信安全。
关键词 移动ad hoc网络 会话密钥协商 安全
下载PDF
Ad hoc网络中ARAN路由协议的安全性分析 被引量:5
9
作者 闫丽丽 彭代渊 《电子与信息学报》 EI CSCD 北大核心 2010年第9期2241-2244,共4页
由于Ad hoc网络的特性,传统的串空间理论无法分析其路由协议的安全性,该文首先对串空间理论进行了扩展,添加了证明中间节点可信的条件。随后,使用扩展后的串空间理论分析了ARAN路由协议的安全性,提出了使用该理论分析Ad hoc网络中安全... 由于Ad hoc网络的特性,传统的串空间理论无法分析其路由协议的安全性,该文首先对串空间理论进行了扩展,添加了证明中间节点可信的条件。随后,使用扩展后的串空间理论分析了ARAN路由协议的安全性,提出了使用该理论分析Ad hoc网络中安全路由协议的新方法。分析和证明结果表明,ARAN路由协议中存在重放和合谋两种攻击,说明采用文中提出的分析方法对Ad hoc网络中的按需距离矢量路由协议的安全性进行分析是有效的。 展开更多
关键词 ad hoc网络 路由协议 串空间 形式化分析 一致性
下载PDF
Ad Hoc网络安全路由协议形式化分析模型 被引量:1
10
作者 刘晶 伏飞 肖军模 《解放军理工大学学报(自然科学版)》 EI 2008年第3期215-221,共7页
为了能够对Ad Hoc网络安全路由协议进行有效的安全性证明,需要形式化的分析方法。针对目前缺乏有效方法的现状,结合Ad Hoc网络安全路由协议特点,利用图论理论,对传统安全协议分析方法Mead-ows模型进行扩展,扩展后的Meadows模型具有了路... 为了能够对Ad Hoc网络安全路由协议进行有效的安全性证明,需要形式化的分析方法。针对目前缺乏有效方法的现状,结合Ad Hoc网络安全路由协议特点,利用图论理论,对传统安全协议分析方法Mead-ows模型进行扩展,扩展后的Meadows模型具有了路由描述和分析能力。使用扩展后的Meadows模型对AdHoc网络安全路由协议Ariadne进行了分析。分析结果显示,Ariadne协议存在产生虚假路由的漏洞,从而也说明了扩展后的Meadows模型能够用于Ad Hoc网络安全路由协议的安全性分析。 展开更多
关键词 ad hoc网络 安全路由协议 形式化分析
下载PDF
一个移动Ad Hoc网密钥协商协议的安全分析 被引量:1
11
作者 徐静 《中国科学院研究生院学报》 CAS CSCD 2008年第5期611-614,共4页
Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.最近王晓峰等学者提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商协议,并认为他们的协议是安全而高效的.然而... Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.最近王晓峰等学者提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商协议,并认为他们的协议是安全而高效的.然而我们发现这一协议存在严重的安全缺陷:不能抵抗离线口令猜测攻击和伪造攻击;不能提供前向安全性和后向安全性;不能动态更新群组成员的密钥. 展开更多
关键词 ad hoc 密钥协商 安全分析
下载PDF
扩展Meadows模型分析Ad Hoc网络路由协议安全性
12
作者 刘晶 伏飞 肖军模 《应用科学学报》 CAS CSCD 北大核心 2008年第3期250-256,共7页
目前,Ad hoc网络安全路由协议缺乏有效的形式化分析方法.通过添加基于图论的路由描述和分析方法,文章扩展了Meadows模型的分析能力.使用扩展后的Meadows模型对Ad hoc网络安全路由协议Ariadne进行了分析,分析结果显示Ariadne协议存在产... 目前,Ad hoc网络安全路由协议缺乏有效的形式化分析方法.通过添加基于图论的路由描述和分析方法,文章扩展了Meadows模型的分析能力.使用扩展后的Meadows模型对Ad hoc网络安全路由协议Ariadne进行了分析,分析结果显示Ariadne协议存在产生虚假路由的漏洞,从而也说明了扩展后的Meadows模型能够用于Ad hoc网络安全路由协议的安全性分析. 展开更多
关键词 ad hoc网络 安全路由协议 形式化分析
下载PDF
Ad Hoc网络会话密钥协商算法研究
13
作者 张昌宏 杨金宝 胡达海 《舰船电子工程》 2012年第6期83-85,共3页
密钥协商是构建Ad hoc安全网络系统需解决的关键问题之一。针对Ad hoc网络的特点,提出了一种基于Chebyshev(2P)多项式的会话密钥协商算法,利用Chebyshev(2P)单项陷门函数来构建用于Ad hoc网络保密通信的会话密钥。经分析表明:该算法具... 密钥协商是构建Ad hoc安全网络系统需解决的关键问题之一。针对Ad hoc网络的特点,提出了一种基于Chebyshev(2P)多项式的会话密钥协商算法,利用Chebyshev(2P)单项陷门函数来构建用于Ad hoc网络保密通信的会话密钥。经分析表明:该算法具有较高的安全性,在P取值较大时,该算法的性能要优于ECDH算法,适合于资源受限、拓扑结构动态变化的Ad hoc网络。 展开更多
关键词 ad hoc网络 密钥协商 网络安全
下载PDF
移动AD—HOC网络的安全性研究
14
作者 王琦进 齐晓霞 《电脑知识与技术》 2008年第5期637-639,共3页
Ad hoc网络是一种独立于固定的基础设施并且采用分布式管理的网络,是一种自创造、自组织、自管理的网络。它为军事通讯、灾难救助、临时通信提供了有效的解决方案。本文对Ad hoc网络的安全问题进行了分析,并指出了Ad hoc网络的安全策... Ad hoc网络是一种独立于固定的基础设施并且采用分布式管理的网络,是一种自创造、自组织、自管理的网络。它为军事通讯、灾难救助、临时通信提供了有效的解决方案。本文对Ad hoc网络的安全问题进行了分析,并指出了Ad hoc网络的安全策略与防范机制。 展开更多
关键词 ad hoc网络 安全分析 安全策略 防范机制
下载PDF
Security Analysis for a VANET Privacy Protection Scheme
15
作者 Yuzhen Liu Xiaoliang Wang +1 位作者 Zhoulei Cao Frank Jiang 《Journal of Cyber Security》 2022年第1期57-64,共8页
Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,da... Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,data transmission process in VANET is vulnerable to leakage and attack.Authentication of vehicle identitywhile protecting vehicle privacy information is an advantageous way to improve the security of VANET.We propose a scheme based on fair blind signature and secret sharing algorithm.In this paper,we prove that the scheme is feasible through security analysis. 展开更多
关键词 Vehicular ad hoc network anonymous authentication fair blind signature secret sharing algorithm security analysis BAN logic ideology
下载PDF
Ad hoc网络中一种高效分层的组密钥管理方案
16
作者 涂山山 马春波 敖发良 《计算机工程与应用》 CSCD 北大核心 2011年第26期86-88,180,共4页
提出了一种高效安全的分层的组密钥管理结构,利用构建多重密钥链来实现组内各密钥的产生以及安全通信信道的建立;具有生成组密钥以及通信密钥安全快捷,整体结构可根据初始要求进行定量布局等特点,适用于动态拓扑结构以及节点储能和计算... 提出了一种高效安全的分层的组密钥管理结构,利用构建多重密钥链来实现组内各密钥的产生以及安全通信信道的建立;具有生成组密钥以及通信密钥安全快捷,整体结构可根据初始要求进行定量布局等特点,适用于动态拓扑结构以及节点储能和计算能力相对较低的Ad hoc网络。 展开更多
关键词 高效安全 组密钥管理 分层 定量布局 ad hoc网络
下载PDF
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
17
作者 Khattab M.Ali Alheeti Anna Gruebler Klaus McDonald-Maier 《Digital Communications and Networks》 SCIE 2017年第3期180-187,共8页
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propos... Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DOS) and black hole attacks on vehicular ad hoe networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Diseriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection. 展开更多
关键词 Secure communication Vehicle ad hoc networks IDS Self-driving vehicles Linear and quadratic discriminant analysis
下载PDF
一种安全DSR协议的形式化分析方法 被引量:2
18
作者 刘晶 伏飞 肖军模 《解放军理工大学学报(自然科学版)》 EI 北大核心 2009年第5期423-429,共7页
目前安全DSR协议由于缺乏有效的形式化分析方法,难以发现一些隐蔽的安全漏洞。针对这一问题,通过分析DSR协议路由过程,给出了安全DSR协议的安全目标。提出了一种基于逻辑的安全DSR协议形式化分析方法,定义了能够反映安全DSR协议特性的... 目前安全DSR协议由于缺乏有效的形式化分析方法,难以发现一些隐蔽的安全漏洞。针对这一问题,通过分析DSR协议路由过程,给出了安全DSR协议的安全目标。提出了一种基于逻辑的安全DSR协议形式化分析方法,定义了能够反映安全DSR协议特性的基本逻辑构件(包括主体、目标和公式)和推理规则。首先用逻辑公式描述协议初始假设及过程,然后用推理规则进行推导产生推导结果,最后依据推导结果判断协议安全性。使用这种方法对SADSR协议进行了形式化分析与改进,发现了SADSR协议存在的安全漏洞。分析结果表明,提出的方法能够用于安全DSR协议形式化分析,能够发现一些较为隐蔽的安全缺陷。 展开更多
关键词 移动自组织网络 安全路由协议 形式化分析 攻击
下载PDF
用于无线移动网中的密钥协商方案 被引量:1
19
作者 秦波 周克复 +2 位作者 秦慧 王尚平 王育民 《西安理工大学学报》 CAS 2005年第1期38-41,共4页
adhoc网是一种新型无线移动网络,内部节点相互合作信任,但是没有中心控制节点,且节点的计算资源非常受限。针对如何在这种自组织群体中进行密钥协商,实现安全通信,提出了一种适合adhoc网的认证密钥协商方案,每个节点仅需2n-2次模乘法运... adhoc网是一种新型无线移动网络,内部节点相互合作信任,但是没有中心控制节点,且节点的计算资源非常受限。针对如何在这种自组织群体中进行密钥协商,实现安全通信,提出了一种适合adhoc网的认证密钥协商方案,每个节点仅需2n-2次模乘法运算,且仅需一轮通信,其中n是adhoc网中的节点数。经对比该方案的效率远远高于现有方案。 展开更多
关键词 ad hoc 密钥协商 对等群体 网络安全
下载PDF
战术移动自组网脆弱性分析与仿真
20
作者 王英 彭钦鹏 +1 位作者 谭歆 张平安 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2021年第4期595-605,共11页
针对战术移动自组网协议的安全性、脆弱性等问题,分析并仿真出适用于战术移动自组网的攻击方案,增强对敌方战场通信电台的控制能力,造成敌方战场通信指挥系统性能衰减甚至瘫痪。该方案从战术移动自组网的介质访问控制(media access cont... 针对战术移动自组网协议的安全性、脆弱性等问题,分析并仿真出适用于战术移动自组网的攻击方案,增强对敌方战场通信电台的控制能力,造成敌方战场通信指挥系统性能衰减甚至瘫痪。该方案从战术移动自组网的介质访问控制(media access control,MAC)层、内联网层、传输层的协议特征分析,解析战术网络电台在MAC层信道竞争接入、内联网层拓扑更新和传输层传输控制协议(transmission control protocol,TCP)的3次握手机制下存在的协议漏洞,并在NS3网络仿真平台中分层构建不同的攻击模型。该模型在内联网层解决了传统移动自组网中路由黑洞攻击不适用于战术移动自组网的问题,同时在传输层重构了TCP半连接队列机制。对比了攻击前网络性能的变化,仿真结果表明,各层实施的攻击技术都能有效降低战术移动自组网的网络性能,验证了所建攻击模型的合理性。 展开更多
关键词 战术移动自组网 协议分析 安全漏洞 攻击模型
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部