期刊文献+

一个基于权限的移动自组网门限信任模型 被引量:2

Threshold trust model based on weight in mobile ad hoc network
在线阅读 下载PDF
导出
摘要 探讨了移动自组网所特有的安全威胁,将Shamir秘密分割模型和权限思想相结合,提出了一个基于权限的门限信任模型,并提出了一种新的私钥分量刷新技术。分析结果表明,该模型在可信节点剩余很少时仍能完成网络中节点的认证,亦可避免攻击者获取足够的私钥分量进行非法认证。 The security threaten for MANET(mobile ad hoc network) was discussed. Combined the secret dividing model and the weight idea, a threshold trustful model based on weight was proposed. A new refurbishing method for private key weight was put forward. The analysis shows that this model can avoid attackers getting enough weight for the private key for lawlessly validating and validate the network nodes when trust nodes remain small.
出处 《计算机应用》 CSCD 北大核心 2006年第3期574-576,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60473091) 国家863计划项目(2003AA142010)
关键词 移动自组网 信任模型 密钥更新 mobile ad hoe network trust model secret refresh
  • 相关文献

参考文献5

  • 1SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2ZHOU L,HASS ZJ.Securing Ad Hoc Networks[J].IEEE Network,1999,13(6):24-29.
  • 3FRANKEL Y,GEMEL P,MACKEZIE P,et al.Optimal resilience proactive public-key cryptosystems[A].Proceedings of the 38th Symposium on Foundations of Computer Science[C].Miami Beach,FL USA,1997.384-393.
  • 4ZHOU L.Towards Fault-Tolerant and Secure On-Line Services[D].Cornell University,2001.
  • 5ZHOU L,SCHNEIDER FB,van RENESSE R.Technical Report 2000-1828,COCA:A secure distributed on-line certification authority[R].Department of Computer Science,Cornell University,Ithaca,NY USA,2000.

同被引文献15

  • 1张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6
  • 2张晓宁,冯登国.无线自组网络中基于簇结构的安全方案[J].计算机研究与发展,2006,43(2):238-243. 被引量:6
  • 3刘志远,毛胜利.一个新的Adhoc安全组密钥管理方案[J].微计算机信息,2006,22(04X):3-4. 被引量:7
  • 4Shamir A. How to Share Secret [ J ]. Communication of ACM, 1979, 22(11): 612-613.
  • 5Blakley G R. Safeguarding Cryptographic Keys [C]//Proe AFIPS 1979 Natl Conf, NewYork, 1979: 313-317.
  • 6Kong J, Zerfos P, Luo H, etal. Providing Robust and Ubiquitous Security Support for Mobile Ad hoe Networks [C-]//Proe 9th Int' 1Conf Network Protocols (ICNP), 2001,.
  • 7Boneh D, Franklin M. Identity-based Encryption From the Weil Pairing [C]//Proceedings of the Cryptology-Crypto 2001 : 213-229.
  • 8Hess F. Exponent Group Signature Schemes and Efficient Identity based Signature Schemes Based on Pairing [EB/OL]. http//epring iacr. org, 2002-08-09.
  • 9Petersen H, Horster P. Self-certified Keys-concepts and Application [ C ]//Third Conference on Communication and Multimedia Security. Athens: Chapman&Hall, 1997 : 102-116.
  • 10Zhou L,Hass Z J. Securing Ad Hoe Networks[J]. IEEE Network, 1999, 13(6): 24-29.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部