期刊文献+

大规模移动自组网安全群组通信研究 被引量:3

Research on secure multicast communications in large-scale mobile Ad Hoc networks
在线阅读 下载PDF
导出
摘要 移动自组网中的安全群组通信需要处理群组成员关系的动态性、成员位置的动态性、以及网络分区和合并等情况。如何高效地处理这些情况是移动自组网安全群组通信中要解决的重要问题。针对成员关系动态性、成员位置动态性和网络分区和合并带来的问题,提出研究与设计一种移动自组网中的“虚拟动态骨干网”模型。主要从组成员认证和组密钥管理两方面进行了研究,并基于虚拟动态骨干网提出了初步的解决方案。 Secure multicast communications in mobile Ad Hoc networks need to deal with some situations such as dynamic membership among group members, dynamic locations of group members, network partitions and merges, and so on. It is an important problem to tackle these situations efficiently secure multicast communications in mobile Ad Hoc networks. In order to solve problems brought by dynamic membership, dynamic locations and dynamic networks, the virtual dynamic backbone model is proposed for mobile Ad Hoc networks. Group member authentication and group key management issues are studied, which are based on our proposed virtual dynamic backbone model.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第17期3111-3113,3139,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60503007) 湖南省自然科学基金项目(05JJ30118)。
关键词 移动自组网 群组通信 认证 密钥管理 虚拟动态骨干网 mobile Ad Hoc network multicast communications authentication key management virtual dynamic backbone
  • 相关文献

参考文献15

二级参考文献82

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.

共引文献128

同被引文献10

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部