期刊文献+

基于Kerberos的移动Ad-hoc网络安全认证方案 被引量:4

Secure Authentication in Mobile Ad-hoc Network Based on Kerberos
在线阅读 下载PDF
导出
摘要 提出了基于Kerberos的移动Ad-hoc网的安全认证机制KADH,它继承了传统Kerberos系统中一些在Ad-hoc网络环境中实用的特性。同时针对结点的移动性和简短性,引入了复制、选择和校验机制确保了连接的安全性,同时使来自网络内部的恶意攻击的危险性降到最低。 This paper presents a new Kerberos assisted Authentication Mechanism in Mobile Ad-hoc Networks named KADH,KADH migrates a number of features from traditional, wired Kerberos environments to the Ad-hoc environment and provides secure extensions to support the more challenging demands of ad-hoc network. Due to the mobility and short range of the nodes, we introduce measures like replication, elections and optional check to ensure maximum connectivity of the clients with the servers and minimize the risk of malicious attacks from within the network.
作者 唐枫 钟珞
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第14期157-159,共3页 Computer Engineering
关键词 安全认证 移动Ad—hoc网络 网络安全 KERBEROS协议 Secure authentication Mobile ad-hoc network Network security Kerberos protocol
  • 相关文献

参考文献6

  • 1Fox A,Gribble S D.Security on the Move:Indirect Authentication Using Kerberos[C].Proc.of the Second Annual International Conference on Mobile Computing and Networking,1996:155-164.
  • 2Pirzada A,McDonald C.A Review of Secure Routing Protocols for Ad-hoc Mobile Wireless Networks[C].Proc.of 2nd Workshop on the Internet,Telecommunications and Signal Processing,2003.
  • 3Kohl J,Neuman S.The Kerberos Network Authentication Service[S].RFC 1510,1993.
  • 4Corson S.Papademetriou S,Papadopoulos P.An Internet MANET Encapsulation Protocol Specification[Z].Internet Draft,1999-08-07.
  • 5Gruenwald L,Javed M.Energy Efficient Data Broadcasting in Mobile Ad-hoc Networks[C].Proc.of the International Database Engineering and Applications Symposium,2002:64-73.
  • 6Bellovin S M,Merritt M.Limitations of the Kerberos Authentication System[C].Proc.of USENIX Winter Conference,1991:253-267.

同被引文献19

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部