期刊文献+
共找到796篇文章
< 1 2 40 >
每页显示 20 50 100
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
1
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k... In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. 展开更多
关键词 ad Hoc networks self-organize bidirectional trust public key management.
下载PDF
A NEW KEY MANAGEMENT METHOD FOR AD HOC NETWORKS 被引量:1
2
作者 Liu, Chun Liu, Jianwel Zhang, Qishan 《China Communications》 SCIE CSCD 2007年第1期8-13,共6页
Some security-sensitive fields like military scenarios are the main application areas of ad hoc networks.In those areas,security issues have to be considered seriously for the network.In this paper, a key management m... Some security-sensitive fields like military scenarios are the main application areas of ad hoc networks.In those areas,security issues have to be considered seriously for the network.In this paper, a key management method based on the combined public key is proposed for ad hoc networks. Through this method,private and public key pairs can be distributed to nodes of ad hoc networks efficiently.No certificate or other authentic channel is needed while two nodes perform authentication and key agreement protocol.The key management method is especially suitable for ad hoc networks,which has no fixed infrastructure and has constrained resources. 展开更多
关键词 KEY management COMBINED PUBLIC KEY ad HOC networks
下载PDF
Complex Threshold Key Management for Ad Hoc Network 被引量:1
3
作者 GUOWei XIONGZhong-wei LIZhi-tang 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期132-136,共5页
A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this... A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this scheme should be efficient in the operationenvironmental alteration and toleianl faults of node, which take the advantages of the benefits ofboth key management approaches and alleviate their limitations. For the cooperation of thecontroller and participation nodes, a (t, n) threshold Elliptic curve sign-encryption scheme withthe specified receiver also has been proposed. Using this threshold sign-encryption scheme, the keymanagement distributes the trust between a controller and a set of participation nodes. 展开更多
关键词 key management ad hoc network threshold cryptography communicationsecurity
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
4
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
A Cooperative Location Management Scheme for Mobile Ad Hoc Networks 被引量:1
5
作者 Demin LI Jiacun WANG +2 位作者 Liping ZHANG Hao LI Jie ZHOU 《International Journal of Communications, Network and System Sciences》 2009年第8期732-741,共10页
A mobile ad hoc network (MANET) is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links. Since MANETs do not have a fixed infrastructure, it is a chal-lenge... A mobile ad hoc network (MANET) is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links. Since MANETs do not have a fixed infrastructure, it is a chal-lenge to design a location management scheme that is both scalable and cost-efficient. In this paper, we propose a cooperative location management scheme, called CooLMS, for MANETs. CooLMS combines the strength of grid based location management and pointer forwarding strategy to achieve high scalability and low signaling cost. An indepth formal analysis of the location management cost of CooLMS is presented. In particular, the total location management cost of mobile nodes moving at variable velocity is estimated using the Gauss_Markov mobility model for the correlation of mobility velocities. Simulation results show CooLMS performs better than other schemes under certain circumstances. 展开更多
关键词 ad HOC Network Grid HOME Region LOCATION management FORWARDING POINTER COST Estimation
下载PDF
Cost management based security framework in mobile ad hoc networks
6
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 Network attacks Mobile ad hoc Cost management Security framework
下载PDF
Performance Evaluation of Queuing Management Algorithms in Hybrid Wireless Ad-Hoc Network
7
作者 Ertshag Hamza Honge Ren +1 位作者 Elmustafa Sayed Xiaolong Zhu 《国际计算机前沿大会会议论文集》 2018年第1期53-53,共1页
下载PDF
Context and Machine Learning Based Trust Management Framework for Internet of Vehicles 被引量:1
8
作者 Abdul Rehman Mohd Fadzil Hassan +4 位作者 Yew Kwang Hooi Muhammad Aasim Qureshi Tran Duc Chung Rehan Akbar Sohail Safdar 《Computers, Materials & Continua》 SCIE EI 2021年第9期4125-4142,共18页
Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),whi... Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),which is expected to be an essential part of smart cities.IoV originated from the merger of Vehicular ad hoc networks(VANET)and the Internet of things(IoT).Security is one of the main barriers in the on-road IoV implementation.Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements.Trust plays a vital role in ensuring security,especially during vehicle to vehicle communication.Vehicular networks,having a unique nature among other wireless ad hoc networks,require dedicated efforts to develop trust protocols.Current TM schemes are inflexible and static.Predefined scenarios and limited parameters are the basis for existing TM models that are not suitable for vehicle networks.The vehicular network requires agile and adaptive solutions to ensure security,especially when it comes to critical messages.The vehicle network’s wireless nature increases its attack surface and exposes the network to numerous security threats.Moreover,internet involvement makes it more vulnerable to cyberattacks.The proposed TM framework is based on context-based cognition and machine learning to be best suited to IoV dynamics.Machine learning is the best solution to utilize the big data produced by vehicle sensors.To handle the uncertainty Bayesian machine learning statistical model is used.The proposed framework can adapt scenarios dynamically and infer using the maximum possible parameter available.The results indicated better performance than existing TM methods.Furthermore,for future work,a high-level machine learning model is proposed. 展开更多
关键词 Internet of vehicles(IoV) trust management(TM) vehicular ad hoc network(VANET) machine learning context awareness bayesian learning
下载PDF
Integration of Individualized Management Systems (MSs) as an Aggregating Factor of Sustainable Value for Organizations An Overview Through a Review of the Literature 被引量:1
9
作者 Manuel Ferreira Rebelo Gilberto Santos Rui Silva 《Journal of Modern Accounting and Auditing》 2014年第3期356-383,共28页
Nowadays, there exist various standards for individual management systems (MSs), at least, one for each stakeholder. New ones will be published. An integrated management system (IMS) aims to integrate some or all ... Nowadays, there exist various standards for individual management systems (MSs), at least, one for each stakeholder. New ones will be published. An integrated management system (IMS) aims to integrate some or all components of the business into one coherent and efficient MS. Maximizing integration is more and more a strategic priority in that it constitutes an opportunity to eliminate and/or reduce potential factors of destruction of value for the organizations and also to be more competitive and consequently promote its sustainable success. A preliminary investigation was conducted on a Portuguese industrial company which, over the years, has been adopting gradually, in whole or in part, individualized management system standards (MSSs). A research, through a questionnaire, was performed with the objective to develop, in a real business environment, an adequate and efficient IMS-QES (quality, environment, and safety) model and to potentiate for the future a generic IMS model to integrate other MSSs. The strategy and research methods have taken into consideration the case study. It was obtained a set of relevant conclusions resulting from the statistical analyses of the responses to the survey. Globally, the investigation results, by themselves, justified and prioritized the conception of a model of development of the IMS-QES and consequent definition and validation of a structure of an IMS-QES model, to be implemented at the small- and medium-sized enterprise (SME) where the investigation was conducted. 展开更多
关键词 integrated management system (IMS) quality management system (QMS) environmental managementsystem (EMS) occupational health and safety management system (OHSMS) sustainable business added value
下载PDF
Application of CVAM-based management accounting in mobile telecommunication enterprises
10
作者 WANG Ya-xing NI Wei-qing 《Journal of Modern Accounting and Auditing》 2010年第2期59-62,共4页
CVAM-based management accounting emphasizes that enterprises should make efforts not only to provide goods or service to customers but also to create value for customers. In practice, customer value should be measured... CVAM-based management accounting emphasizes that enterprises should make efforts not only to provide goods or service to customers but also to create value for customers. In practice, customer value should be measured reasonably first. Then according to its condition, enterprise can apply the CVAM-based management accounting method by improving management quality, perfecting costing planning, brand operation and business innovation to create value for customers thus achieving increase of corporate value as well as social value. 展开更多
关键词 customer value added management (CVAM) management accounting mobile telecommunication enterprises
下载PDF
A Framework for Vehicular Accident Management Using Wireless Networks
11
作者 Fekri M. Abduljalil 《通讯和计算机(中英文版)》 2013年第3期367-370,共4页
关键词 无线网络 事故管理 框架 分布式系统 车祸 网络架构 移动车辆 互联网接入
下载PDF
移动ad hoc网络安全综述 被引量:63
12
作者 易平 蒋嶷川 +1 位作者 张世永 钟亦平 《电子学报》 EI CAS CSCD 北大核心 2005年第5期893-899,共7页
 移动adhoc网络是由移动节点自组织形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁.该文介绍了移动adhoc网络安全研究的最新研究进展.首先从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动adho...  移动adhoc网络是由移动节点自组织形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁.该文介绍了移动adhoc网络安全研究的最新研究进展.首先从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动adhoc网络的安全弱点,然后将移动adhoc网络安全方面的研究分为三个方向:密钥分配与管理、入侵检测、增强合作.对每个方向内一些典型安全方案也进行了分类论述,同时分析了各种方案的优点和缺点,并进行了综合比较.文中阐明了目前协议存在的一些问题并提出了相应的改进方法,最后指出了下一步研究方向. 展开更多
关键词 计算机网络 信息安全 移动 ad HOC 网络 密钥管理 入侵检测 增强合作
下载PDF
Ad hoc空间网络密钥管理与认证方案 被引量:17
13
作者 杨德明 慕德俊 许钟 《通信学报》 EI CSCD 北大核心 2006年第8期104-107,112,共5页
为了使一组卫星动态配置成一个具有灵活的分布式体系结构的集成网络信息系统,可以采用adhoc组网方式,这种卫星网络的组网方式带来了新的安全挑战。提出了一个灵活的安全方案,设计了公钥基础设施和认证策略。基于完全分布式的认证中心,... 为了使一组卫星动态配置成一个具有灵活的分布式体系结构的集成网络信息系统,可以采用adhoc组网方式,这种卫星网络的组网方式带来了新的安全挑战。提出了一个灵活的安全方案,设计了公钥基础设施和认证策略。基于完全分布式的认证中心,可以直接采用几乎所有的标准公钥认证协议。当空间节点的计算能力有限时,设计了一个轻型的基于对称密钥算法和单向散列函数的认证协议,在提供保密性和数据完整性的同时大大减小了计算量。 展开更多
关键词 ad HOC 空间网络 密钥管理 认证
下载PDF
一个应用于移动Ad Hoc网络管理的簇生成算法 被引量:19
14
作者 冯永新 王光兴 +1 位作者 刘治国 姜月秋 《软件学报》 EI CSCD 北大核心 2003年第1期132-138,共7页
移动Ad hoc网络(mobile Ad hoc network,简称MANET)作为一种新型移动无线通信网,与其他通信网络相比独有的特性增加了网络管理的难度.目前对MANET网络管理的研究处于起步阶段,一些标准尚未制定,而且像存在单向链路和节点的相对移动性这... 移动Ad hoc网络(mobile Ad hoc network,简称MANET)作为一种新型移动无线通信网,与其他通信网络相比独有的特性增加了网络管理的难度.目前对MANET网络管理的研究处于起步阶段,一些标准尚未制定,而且像存在单向链路和节点的相对移动性这类问题也在研究中被忽视.为此,提出了一个利用令牌机制与最小节点标识相结合,适用于层次性管理结构的基于图的MANET簇生成算法,以及对MIB(management information base)的建议性改进.算法充分考虑了网络存在的单向链路和节点的相对移动性,提高了网络管理的灵活性和可扩展性,为MANET的网络管理提出了一种新方法. 展开更多
关键词 移动adHOC网络 簇生成算法 网络管理 移动通信网 无线网络接口
下载PDF
适合ad hoc网络无需安全信道的密钥管理方案 被引量:18
15
作者 李慧贤 庞辽军 王育民 《通信学报》 EI CSCD 北大核心 2010年第1期112-117,共6页
密钥管理问题是构建ad hoc安全网络系统首要解决的关键问题之一。针对ad hoc网络特点,提出了一个无需安全信道的门限密钥管理方案。该方案中,可信中心的功能由局部注册中心和分布式密钥生成中心共同实现,避免了单点失效问题;通过门限技... 密钥管理问题是构建ad hoc安全网络系统首要解决的关键问题之一。针对ad hoc网络特点,提出了一个无需安全信道的门限密钥管理方案。该方案中,可信中心的功能由局部注册中心和分布式密钥生成中心共同实现,避免了单点失效问题;通过门限技术,网络内部成员相互协作分布式地生成系统密钥;利用基于双线性对的公钥体制实现了用户和分布式密钥生成中心的双向认证;通过对用户私钥信息进行盲签名防止攻击者获取私钥信息,从而可以在公开信道上安全传输。分析表明该方案达到了第III级信任,具有良好的容错性,并能抵御网络中的主动和被动攻击,在满足ad hoc网络安全需求的情况下,极大地降低了计算和存储开销。 展开更多
关键词 ad HOC网络 密钥管理 双线性对 门限密码
下载PDF
移动Ad-hoc网络安全 被引量:13
16
作者 况晓辉 胡华平 吕世辉 《小型微型计算机系统》 CSCD 北大核心 2003年第10期1861-1864,共4页
移动 Ad- hoc网络是一种不依赖任何固定的基础设施的新型的无线网络 .在网络中 ,节点之间的通信完全依赖无线链路 ,网络拓扑随着节点的移动频繁变化 .移动 Ad- hoc网络不同于有线网络的特性对于保证其安全性提出了新的挑战 .本文在探讨... 移动 Ad- hoc网络是一种不依赖任何固定的基础设施的新型的无线网络 .在网络中 ,节点之间的通信完全依赖无线链路 ,网络拓扑随着节点的移动频繁变化 .移动 Ad- hoc网络不同于有线网络的特性对于保证其安全性提出了新的挑战 .本文在探讨移动 Ad- hoc网络的安全需求的基础上 ,着重分析了移动 Ad- hoc网络易于遭受的攻击 ,并集中了讨论移动 Ad- hoc网络的路由安全。 展开更多
关键词 移动ad-HOC网络 路由安全 密钥管理 无线网络
下载PDF
基于带宽估计的ad hoc网络拥塞控制机制 被引量:13
17
作者 王庆辉 潘学松 王光兴 《通信学报》 EI CSCD 北大核心 2006年第4期42-48,共7页
针对adhoc网络提出了一种基于带宽估计的拥塞控制机制。该机制通过实时的监测无线节点链路的工作状态,来估计节点的可用带宽,从而获得节点的拥塞程度指标,根据包的类型进行拥塞控制。由于带宽估计不需要与其他节点进行状态信息交换,降... 针对adhoc网络提出了一种基于带宽估计的拥塞控制机制。该机制通过实时的监测无线节点链路的工作状态,来估计节点的可用带宽,从而获得节点的拥塞程度指标,根据包的类型进行拥塞控制。由于带宽估计不需要与其他节点进行状态信息交换,降低了系统开销。同时拥塞控制机制缓解了无线网络的拥塞状态,提高了网络性能。 展开更多
关键词 ad HOC网络 拥塞控制 带宽估计 队列管理
下载PDF
Adhoc网络密钥生成管理方案综述与分析 被引量:3
18
作者 王少辉 王美琴 +2 位作者 张睿超 潘景山 王春梅 《计算机应用研究》 CSCD 北大核心 2004年第10期9-11,21,共4页
Adhoc网络安全性是迅速发展的一个研究热点,提出高效适用的密钥生成管理方案是其中的难点,目前对此已有的成果纷繁多样。分类总结了这方面的理论,对比和分析了各种方法的功能,并指出了各自存在的问题,总结出密钥生成和管理协议存在的共... Adhoc网络安全性是迅速发展的一个研究热点,提出高效适用的密钥生成管理方案是其中的难点,目前对此已有的成果纷繁多样。分类总结了这方面的理论,对比和分析了各种方法的功能,并指出了各自存在的问题,总结出密钥生成和管理协议存在的共性问题,为进一步的工作提供了清晰的思路。 展开更多
关键词 ad HOC网络 密钥管理 证书认证
下载PDF
Ad hoc网络中基于双线性配对的STR组密钥管理协议研究 被引量:13
19
作者 周福才 徐剑 +1 位作者 徐海芳 刘泽超 《通信学报》 EI CSCD 北大核心 2008年第10期117-125,共9页
STR组密钥管理协议具有较好的计算、通信和存储代价,但在安全性方面,由于没有提供密钥认证,不能抵御主动攻击。在分析STR协议基础上,引入双线性配对密码体制和三叉密钥树来实现组密钥管理,提出PSTR(bilinear pairing-based STR)协议,其... STR组密钥管理协议具有较好的计算、通信和存储代价,但在安全性方面,由于没有提供密钥认证,不能抵御主动攻击。在分析STR协议基础上,引入双线性配对密码体制和三叉密钥树来实现组密钥管理,提出PSTR(bilinear pairing-based STR)协议,其中包括密钥产生过程及其6个子协议,对PSTR协议安全性进行分析,证明了PSTR协议在计算上是安全的。分析与比较了PSTR协议和STR协议的性能,结果表明PSTR协议在通信代价、计算代价和存储代价均优于STR协议,因此PSTR协议是ad hoc环境下一种新型、可靠的组密钥管理协议。 展开更多
关键词 ad HOC网络 多播密钥管理 双线性配对 PSTR
下载PDF
一个改进的AdHoc网络权值簇生成算法 被引量:3
20
作者 孙学梅 杨柳 +1 位作者 任长明 吴艳玮 《计算机工程与应用》 CSCD 北大核心 2004年第29期199-201,共3页
AdHoc网络具有动态变化的拓扑结构,无中心和自组织的特点,如何对它进行有效的管理至今没有得到很好的解决。该文针对目前已有的一些簇算法的缺点并结合它们的优点,提出了一种改进的权值簇算法EWCA。该算法综合考虑了簇的稳定性、节点的... AdHoc网络具有动态变化的拓扑结构,无中心和自组织的特点,如何对它进行有效的管理至今没有得到很好的解决。该文针对目前已有的一些簇算法的缺点并结合它们的优点,提出了一种改进的权值簇算法EWCA。该算法综合考虑了簇的稳定性、节点的电耗、网络的负载平衡、网络的吞吐率等几项网络指标,从而提高了网络管理的灵活性和可扩展性,使之更适合于管理大规模、多种环境的AdHoc无线网络。 展开更多
关键词 ad HOC网络 网络管理
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部