期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
Trust-based co-operative routing for secure communication in mobile ad hoc networks
1
作者 Ankita A.Mahamune M.M.Chandane 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1079-1087,共9页
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ... The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency. 展开更多
关键词 Mobile ad hoc NETwork Secure communication AODV Co-operative routing Trust metric
下载PDF
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
2
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) privacy security vehicular ad hoc network(VANET)
下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
3
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY security mobile ad hoc network(MANET).
下载PDF
A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
4
作者 A.F.M.Suaib Akhter A.F.M.Shahen Shah +3 位作者 Mohiuddin Ahmed Nour Moustafa UnalÇavu¸soglu Ahmet Zengin 《Computers, Materials & Continua》 SCIE EI 2021年第7期229-246,共18页
Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput b... Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources.To overcome these challenges,we propose a blockchain-based Secured Cluster-based MAC(SCB-MAC)protocol.The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages.The message which contains emergency information and requires Strict Delay Requirement(SDR)for transmission are called safety messages(SM).Cluster Members(CMs)sign SMs with their private keys while sending them to the blockchain to confirm authentication,integrity,and confidentiality of the message.A Certificate Authority(CA)is responsible for physical verification,key generation,and privacy preservation of the vehicles.We implemented a test scenario as proof of concept and tested the safety message transmission(SMT)protocol in a real-world platform.Computational and storage overhead analysis shows that the proposed protocol for SMT implements security,authentication,integrity,robustness,non-repudiation,etc.while maintaining the SDR.Messages that are less important compared to the SMs are called non-safety messages(NSM)and vehicles use RTS/CTS mechanism for NSM transmission.Numerical studies show that the proposed NSM transmission method maintains 6 times more throughput,2 times less delay and 125%less Packet Dropping Rate(PDR)than traditional MAC protocols.These results prove that the proposed protocol outperforms the traditional MAC protocols. 展开更多
关键词 ad hoc networks data security digital signatures distributed storage intelligent vehicles vehicular ad hoc networks wireless communication
下载PDF
一种Ad Hoc网络中的安全匿名按需路由协议 被引量:8
5
作者 陈晶 崔国华 +1 位作者 洪亮 付才 《计算机科学》 CSCD 北大核心 2007年第1期29-33,60,共6页
虽然现在研究AdHoc网络中安全的文章很多,但是很少有人考虑到匿名的问题。本文中,匿名性的定义更加严格,将匿名性细分为身份保密、位置保密和路由匿名三个部分。文章提出安全匿名按需路由协议(SADR,Secure Anonymous Routing)不但保证... 虽然现在研究AdHoc网络中安全的文章很多,但是很少有人考虑到匿名的问题。本文中,匿名性的定义更加严格,将匿名性细分为身份保密、位置保密和路由匿名三个部分。文章提出安全匿名按需路由协议(SADR,Secure Anonymous Routing)不但保证了路由安全形成和维护,数据安全传输,并且同时满足了匿名性各个方面的要求,特别是很容易被忽略的身份匿名性和强位置保密性,使得恶意节点无法获得合法节点的身份与位置信息,从而难于进行攻击。为了清晰准确的表达SADR协议的过程,引入了DFA(deterministic finite automaton)进行描述,并使用BAN逻辑推理规则进行了安全性证明。最后,对比仿真数据,分析了加入安全匿名机制后,给性能上带来的影响。 展开更多
关键词 ad hoc 网络安全 匿名性 路由协议
下载PDF
基于零知识证明的低能耗Ad Hoc网络匿名路由协议 被引量:4
6
作者 刘方斌 刘凤玉 张宏 《南京理工大学学报》 EI CAS CSCD 北大核心 2012年第5期879-885,共7页
为降低匿名路由协议中公钥运算量,提出基于零知识证明的低能耗自组织(Ad Hoc)网络匿名路由协议(ARZ)。协议通过将零知识证明验证协议应用于陷门的构造中,减少了解陷门所需的大量公钥操作;将节点协商秘密信息工作转移到路由应答阶段,减... 为降低匿名路由协议中公钥运算量,提出基于零知识证明的低能耗自组织(Ad Hoc)网络匿名路由协议(ARZ)。协议通过将零知识证明验证协议应用于陷门的构造中,减少了解陷门所需的大量公钥操作;将节点协商秘密信息工作转移到路由应答阶段,减少了协商密钥时的公钥操作量。协议分析和实验结果表明,ARZ在保证不降低安全性和匿名性的前提下,大幅减少了公钥运算量,降低了节点能源消耗和路由建立时延。 展开更多
关键词 零知识证明 低能耗 低时延 匿名路由 自组织网络安全
下载PDF
移动Ad Hoc网络可认证安全匿名通信研究
7
作者 周曜 平萍 +1 位作者 徐佳 刘凤玉 《计算机科学》 CSCD 北大核心 2009年第5期51-55,71,共6页
传统的移动Ad Hoc网络匿名路由协议无法鉴别伪造的路由控制分组,并且公钥运算过多导致路由建立时间延长。提出一种基于邻居认证的安全匿名路由协议以解决上述问题,通过基于临时身份公钥的邻居匿名认证机制鉴定邻居节点合法性并动态协商... 传统的移动Ad Hoc网络匿名路由协议无法鉴别伪造的路由控制分组,并且公钥运算过多导致路由建立时间延长。提出一种基于邻居认证的安全匿名路由协议以解决上述问题,通过基于临时身份公钥的邻居匿名认证机制鉴定邻居节点合法性并动态协商密钥,路由发现过程中利用邻居协商密钥对路由控制消息进行逐跳的验证与处理。上述机制使得伪造路由分组可被有效鉴别,并且中间节点基于对称密钥运算处理分组降低了路由发现时延。理论分析和仿真结果表明,该协议可对抗基于伪造分组的DoS攻击,并且较传统协议具有更低的路由建立时间。 展开更多
关键词 网络安全 移动ad hoc网络 匿名路由 临时身份公钥 邻居匿名认证
下载PDF
无线Ad hoc网络匿名通信技术研究 被引量:2
8
作者 王秀芝 石志东 +2 位作者 房卫东 张小珑 单联海 《计算机应用与软件》 CSCD 2016年第2期89-93,共5页
无线Ad hoc网络(MANET)的多跳、自组织、无固定设施以及运算资源有限等特性,使得传统网络中复杂度高的安全算法难以应用于其中。而采用与匿名技术相结合的安全机制,可较好地解决节点隐私和通信关系保密的安全问题。针对现有的匿名技术,... 无线Ad hoc网络(MANET)的多跳、自组织、无固定设施以及运算资源有限等特性,使得传统网络中复杂度高的安全算法难以应用于其中。而采用与匿名技术相结合的安全机制,可较好地解决节点隐私和通信关系保密的安全问题。针对现有的匿名技术,采用对比分析的方法,对传统网络的匿名技术进行分析,总结技术上的优缺点,研究Ad hoc网络的匿名技术,并对比分析各种匿名通信协议的安全性能,为后续的研究与应用提供帮助。 展开更多
关键词 无线ad hoc网络 安全性 匿名通信 隐私
下载PDF
基于Pairing的移动Ad hoc网络匿名路由协议 被引量:1
9
作者 苗华 黄继平 刘智 《计算机工程与应用》 CSCD 北大核心 2008年第29期142-145,共4页
提出了一种基于Pairing的移动Ad hoc网络匿名路由协议ANRT。该协议应用新的密码技术较好地解决了门限构造难题并保证了系统的可伸缩性。协议同时具备认证、加密等安全协议的特性。为了对协议进行清晰准确的评估,对其进行了模拟并对实验... 提出了一种基于Pairing的移动Ad hoc网络匿名路由协议ANRT。该协议应用新的密码技术较好地解决了门限构造难题并保证了系统的可伸缩性。协议同时具备认证、加密等安全协议的特性。为了对协议进行清晰准确的评估,对其进行了模拟并对实验结果予以分析。最后,指出了匿名路由协议进一步研究需注意的问题和研究方向。 展开更多
关键词 移动自组网(ad hoc) paring 匿名 路由协议 网络安全
下载PDF
用于Ad Hoc匿名安全动态源路由协议 被引量:1
10
作者 孟庆俊 彭军 《微计算机信息》 北大核心 2008年第33期50-52,共3页
剖析了无线Adhoc网络需要匿名的安全传输协议防止网络攻击,保证节点位置、运动方式和网络拓扑等信息的安全。本文首先介绍了安全协议满足的目标,然后提出了一种匿名动态源路由协议(ADSR),利用共享密钥传输信息已达到安全目的。本文也在... 剖析了无线Adhoc网络需要匿名的安全传输协议防止网络攻击,保证节点位置、运动方式和网络拓扑等信息的安全。本文首先介绍了安全协议满足的目标,然后提出了一种匿名动态源路由协议(ADSR),利用共享密钥传输信息已达到安全目的。本文也在仿真中对比了几种协议的性能和稳定性,指出本文提出协议的优缺点。 展开更多
关键词 移动ad hoc网络 动态源路由 匿名 安全
下载PDF
A Systematic Approach for Cyber Security in Vehicular Networks 被引量:1
11
作者 Farhan Ahmad Asma Adnane Virginia N. L. Franqueira 《Journal of Computer and Communications》 2016年第16期38-62,共26页
Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and wit... Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and with adjacent infrastructure by exchanging significant messages, such as road accident warnings, steep-curve ahead warnings or traffic jam warnings. However, this communication and other assets involved are subject to major threats and provide numerous opportunities for attackers to launch several attacks and compromise security and privacy of vehicular users. This paper reviews the cyber security in VANET and proposes an asset-based approach for VANET security. Firstly, it identifies relevant assets in VANET. Secondly, it provides a detailed taxonomy of vulnerabilities and threats on these assets, and, lastly, it classifies the possible attacks in VANET and critically evaluates them. 展开更多
关键词 Vehicular networks ad hoc networks Cyber security privacy VULNERABILITIES Threats ASSETS Smart City
下载PDF
Security Analysis for a VANET Privacy Protection Scheme
12
作者 Yuzhen Liu Xiaoliang Wang +1 位作者 Zhoulei Cao Frank Jiang 《Journal of Cyber Security》 2022年第1期57-64,共8页
Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,da... Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,data transmission process in VANET is vulnerable to leakage and attack.Authentication of vehicle identitywhile protecting vehicle privacy information is an advantageous way to improve the security of VANET.We propose a scheme based on fair blind signature and secret sharing algorithm.In this paper,we prove that the scheme is feasible through security analysis. 展开更多
关键词 Vehicular ad hoc network anonymous authentication fair blind signature secret sharing algorithm security analysis BAN logic ideology
下载PDF
Lattice-Based Double-Authentication-Preventing Ring Signature for Security and Privacy in Vehicular Ad-Hoc Networks 被引量:10
13
作者 Jinhui Liu Yong Yu +4 位作者 Jianwei Jia Shijia Wang Peiru Fan Houzhen Wang Huanguo Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期575-584,共10页
Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives o... Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals. However, there remain challenges for VANETs in preserving privacy and security. In this paper, we propose the first lattice-based Double-Authentication-Preventing Ring Signature (DAPRS) and adopt it to propose a novel privacy-preserving authentication scheme for VANETs, offering the potential for security against quantum computers. The new construction is proven secure against chosen message attacks. Our scheme is more efficient than other ring signature in terms of the time cost of the message signing phase and verification phase, and also in terms of signature length. Analyses of security and efficiency demonstrate that our proposed scheme is provably secure and efficient in the application. 展开更多
关键词 Vehicular ad-hoc NETwork(VANET) privacy security Double-Authentication-Preventing Ring Signature(DAPRS) LATTICE
原文传递
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
14
作者 Khattab M.Ali Alheeti Anna Gruebler Klaus McDonald-Maier 《Digital Communications and Networks》 SCIE 2017年第3期180-187,共8页
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propos... Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DOS) and black hole attacks on vehicular ad hoe networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Diseriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection. 展开更多
关键词 Secure communication Vehicle ad hoc networks IDS Self-driving vehicles Linear and quadratic discriminant analysis
下载PDF
基于区块链的车载自组网车与基础设施快速切换认证方案 被引量:2
15
作者 宁娟桂 董国芳 《计算机应用》 CSCD 北大核心 2024年第1期252-260,共9页
针对车载自组网(VANET)中车辆通信面临的安全风险挑战以及车辆进入新的基础设施覆盖范围时需要进行复杂的身份重新认证问题,提出基于区块链的车载自组网V2I(Vehicle-to-Infrastructure)快速切换认证方案。该方案利用区块链去中心化、分... 针对车载自组网(VANET)中车辆通信面临的安全风险挑战以及车辆进入新的基础设施覆盖范围时需要进行复杂的身份重新认证问题,提出基于区块链的车载自组网V2I(Vehicle-to-Infrastructure)快速切换认证方案。该方案利用区块链去中心化、分布式和防篡改的特性,实现车辆认证信息的存储与查询;使用令牌机制,减少区块链查询次数,简化路边单元(RSU)切换认证阶段的认证过程,在后续的认证过程中只需检查令牌的有效性,实现了RSU的快速切换认证;采用了批量认证方法,能有效减少认证过程中的计算开销,提高消息认证效率;另外,可以实现对恶意车辆的追溯与撤销,并及时更新车辆的匿名身份,保证车辆的匿名性。相较于匿名批量认证方案、全聚合认证方案、无证书聚合签名方案、基于区块链的认证方案,所提方案在消息认证耗时上缩短了约51.1%、77.45%、77.56%和76.01%。实验结果表明,该方案能够有效降低车载自组网中的计算开销和通信开销。 展开更多
关键词 车载自组网 区块链 快速切换 匿名认证 安全通信
下载PDF
车联网终端轻量级认证技术研究
16
作者 许盛伟 刘家兴 刘润生 《北京电子科技学院学报》 2024年第2期23-33,共11页
车载自组织网络在物联网具有重要意义。然而,犯罪分子利用公开渠道窃听、篡改消息来锁定和控制车辆,这会导致车祸、隐私泄露等安全问题。为此,本文开发了基于SM2公钥密码算法的无证书轻量级身份认证方案Light⁃V2X,结合ECDH密钥协商和假... 车载自组织网络在物联网具有重要意义。然而,犯罪分子利用公开渠道窃听、篡改消息来锁定和控制车辆,这会导致车祸、隐私泄露等安全问题。为此,本文开发了基于SM2公钥密码算法的无证书轻量级身份认证方案Light⁃V2X,结合ECDH密钥协商和假名认证技术,在多辆车同时进入特定区域时进行批量处理,从而提高通信效率。通过非形式化安全分析、ROR模型下形式化安全性证明、使用AVISPA工具仿真实验,以及与其他方案的性能横向对比,结果表明本方案具有优越的性能表现,有效降低开销成本。 展开更多
关键词 车载自组织网络(VANET) 认证 密码协议 安全性 SM2密码算法 匿名性
下载PDF
车联网匿名认证方案研究 被引量:7
17
作者 宋成 张明月 +3 位作者 彭维平 刘志中 贾宗璞 闫玺玺 《小型微型计算机系统》 CSCD 北大核心 2018年第5期899-903,共5页
针对当前车联网匿名认证方案安全性和效率的问题,利用椭圆曲线密码体制密钥短、速度快和安全性能高等优越性,提出一个安全高效的车联网批量匿名认证方案.通过路侧单元(RSU)与车辆共同生成签名,从而进一步减轻可信中心的负担.通过分析表... 针对当前车联网匿名认证方案安全性和效率的问题,利用椭圆曲线密码体制密钥短、速度快和安全性能高等优越性,提出一个安全高效的车联网批量匿名认证方案.通过路侧单元(RSU)与车辆共同生成签名,从而进一步减轻可信中心的负担.通过分析表明:该方案不仅能解决隐私保护、不可链接性、抗中间人攻击、抗合谋攻击、前向和后向安全、抗重放攻击等多种安全问题,而且在计算复杂度和通信复杂度方面也存在明显优势,具有更高的认证效率.因此,该方案在计算性能受限的物联网环境中,具有重要的理论意义与应用价值. 展开更多
关键词 椭圆曲线 匿名认证 隐私保护 车联网
下载PDF
车载自组织网络中基于身份的匿名认证方案 被引量:10
18
作者 张刚 石润华 仲红 《计算机工程与应用》 CSCD 北大核心 2016年第17期101-106,122,共7页
针对于车载自组织网络中的身份认证问题,提出一种新颖的基于身份的匿名认证方案,该方案在保护了车辆的身份隐私信息的同时不仅满足了车辆节点与路边单元节点间的身份认证的需求,而且确保了车辆节点之间的身份认证。该方案利用基于身份... 针对于车载自组织网络中的身份认证问题,提出一种新颖的基于身份的匿名认证方案,该方案在保护了车辆的身份隐私信息的同时不仅满足了车辆节点与路边单元节点间的身份认证的需求,而且确保了车辆节点之间的身份认证。该方案利用基于身份的密码技术,减少了系统管理公钥证书的工作量和对节点证书认证的代价。最后通过安全性和复杂性分析,结果表明该方案不仅易于实现,而且安全可靠并具有较低的计算复杂度及通信开销。 展开更多
关键词 车载自组织网络 隐私保护 身份认证 匿名认证
下载PDF
VANET安全技术综述 被引量:10
19
作者 陈辰 韩伟力 王新 《小型微型计算机系统》 CSCD 北大核心 2011年第5期896-904,共9页
随着车载自组织网络技术的不断发展,研究者对车载自组织网络系统安全进行了深入研究.论文阐述了车载自组织网络领域中安全研究的重要性;介绍了该领域中目前最新研究进展和存在的主要问题;讨论并比较了各种安全协议应用于车载自组织网络... 随着车载自组织网络技术的不断发展,研究者对车载自组织网络系统安全进行了深入研究.论文阐述了车载自组织网络领域中安全研究的重要性;介绍了该领域中目前最新研究进展和存在的主要问题;讨论并比较了各种安全协议应用于车载自组织网络的优缺点;分析总结了系统中安全协议的设计要素;最后展望了车载自组织网络安全技术的未来研究方向. 展开更多
关键词 车载自组织网络 信息安全 数字签名 隐私保护 数据验证
下载PDF
一种基于TPM增强的ARAN安全路由协议 被引量:1
20
作者 王博 黄传河 +1 位作者 杨文忠 王桐 《计算机科学》 CSCD 北大核心 2010年第11期55-58,74,共5页
安全路由协议设计是Adhoc网络安全研究的重要组成部分。当前研究主要集中在采用经典密码学中的方法来保证路由安全。结合可信计算中的TPM和典型的安全路由协议ARAN,提出了一种新的安全路由协议TEA-RAN,该协议不再采用集中式的公钥证书... 安全路由协议设计是Adhoc网络安全研究的重要组成部分。当前研究主要集中在采用经典密码学中的方法来保证路由安全。结合可信计算中的TPM和典型的安全路由协议ARAN,提出了一种新的安全路由协议TEA-RAN,该协议不再采用集中式的公钥证书分发中心PKI,而是采用TPM中的DAA(Directed Anonymous Attestation)方式来进行节点的身份认证,以及软安全中可信阈值来监测邻居节点的行为,从而进行公钥可信分发,同时确保了无恶意节点加入网络,另外,也采用公钥签名、会话密钥加密来保证端到端通信的保密性、完整性和不可否认性。理论证明了提出的TEARAN协议能够实现网络的匿名安全,防范当前常见的攻击方式,达到了很好的安全保证效果。 展开更多
关键词 TPM 安全路由 可信 匿名 adhoc网络
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部