期刊文献+

一种双向认证Ad hoc安全路由协议的研究 被引量:1

Research of a Mutual Authenticated Secure Ad hoc Routing Protocol
在线阅读 下载PDF
导出
摘要 由于网络拓扑的动态性、无线链路的多跳性,传统路由协议不能保证Adhoc网络的路由安全.文章提出一种双向认证Adhoc安全路由协议—MASRP(mutualauthenticatedsecureAdhocroutingprotocol)协议,通过在按需路由发现的同时实现端到端节点的身份认证和一次性会话密钥的交换,以保障路径发现的正确性和数据端到端传输的可靠性,提高路由协议的安全性.协议的安全性在BAN逻辑分析下得到证明. Because of frequent topology changes and wireless multi-hop link, traditional security routing protocol can't adapt mobile Ad hoc networks. In this paper, a mutual authentication security Ad hoc Network routing protocol, MASRP(mutual authenticated secure Ad hoc routing protocol) is proposed. With mutual authentication end nodes and exchange one-time session key in the route discovery of demand routing, it ensure that it is correctness of routing discovers and reliability of data transfers from end to end, to increase the secure of routing protocol. At the end of this paper, the secure of protocol is also proved by BAN logic.
作者 李之棠 郭伟
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第9期1507-1509,共3页 Journal of Chinese Computer Systems
基金 国家网络与信息安全保障持继发展计划(2004研1-917-021)资助.
关键词 AD HOC网络 安全路由协议 认证 密钥交换 BAN逻辑 Ad hoc Network security routing protocol authentication key exchange BAN logic
  • 相关文献

参考文献1

共引文献59

同被引文献11

  • 1侯峻峰,张磊,黄连生.一种新的安全协议形式化验证方法[J].计算机研究与发展,2004,41(8):1415-1420. 被引量:1
  • 2王英龙,王继志,王美琴.基于BAN逻辑的ad hoc移动网络路由协议的安全性分析[J].通信学报,2005,26(4):125-129. 被引量:4
  • 3Papadimitratos P,Haas Z.Seeure routing for mobile ad hoe networks[C]//Proc of the CNDS' 02(TX,San Antonio), January 2002.
  • 4Sanzgiri K,Dahill B,Levine B.A secure routing protocol for Ad Hoc networks[C]//Proceedings of the IEEE 2002 International Conference on Network Protocols(ICNP),Nov 2002.
  • 5Mavropodi R,Kotzanikolaou P,Douligeris C.SecMR-a secure multipath routing protocol for ad hoc networks[J].Ad Hoc Networks,2007(5):87-99.
  • 6Liu Hong-jun,Luo Ping,Wang Dao-shun.A scalable authentication model based on public keys[J].Joumal of Network and Computer Applications, 2008,3 ( 3 ).
  • 7Giovanni Di Crescenzo.Secure node discovery in Ad-hoc networks and applications[J].Electronic Notes in Theoretical Computer Science, 2007,171:43-55.
  • 8Narula P,Dhurandher S K,Misra S.Security in mobile ad-hoe networks using soft encryption and trust-based multi-path routing[J]. Computer Communications,2008,31:760-769.
  • 9Pham P P,Perreau S.Performance analysis of reactive shortest path and multi-path routing mechanism with load balance[C]//IEEE INFOCOMM 2003.
  • 10Burrows M,Abadi M,Needham R.A logic of authentication [J]. ACM Trans on Computer Systems, 1990,8(1 ): 18-36.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部