期刊文献+

无线网络中动态组密钥管理方案 被引量:3

Dynamic multicast key management in wireless network
在线阅读 下载PDF
导出
摘要 在无线网络环境中,在对一组用户服务时,需要为其分配一个组共享密钥。好的密钥管理方案可以极大减少网络通信量,提高系统效率。论文分析了密钥管理的现状及存在的问题,然后提出了一种无线网络中基于物理拓扑结构的逻辑密钥树方案,并对此方案进行设计和性能分析,仿真结果表明此方案能有效减少网络通信量。 In the wireless environment,we need to allocate a group key for everyone in the group in some kinds of service.An excellent key management schemes can efficiently reduce the communication burden,improve the system performance.In this paper,we analyze the state and the problem of existing key management schemes,then propose a Logical Key Tree scheme based on physic topology.we design the scheme and evaluate the performance.Simulation results show that this scheme can reduce communication burden efficiently.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第5期133-136,共4页 Computer Engineering and Applications
基金 重庆市自然科学基金(the Natural Science Foundation of Chongqing City of China under Grant No.CSTC2005BB2190)
关键词 多播安全 无线网络 密钥管理 密钥分配 密钥树 muhicast security wireless network key management rekey key tree
  • 相关文献

参考文献11

  • 1徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 2Harney H,Muckenhirn C.Group Key Management Protocol(GKMP)specification RFC 2093[S],1997-07.
  • 3Canetti R,Garay J,Itkis G,et al.Multicast security:a taxonomy and efficient constructions[C]//Proceedings of the Conference on Computer Communications(IEEE Infocom),New York,Mar.1999.
  • 4Wong Chung Kei,Gouda M,Lam S S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1).
  • 5Wallner D M,Harder E J,Agee R C.Key management for multicast:issues and architectures RFC 2627[S],1999-06.
  • 6Chang I.Key management for secure Internet multicast using Boolean function minimization techniques[C]//Proc IEEE INFOCOM'99,Conf Comp Commun,1999,2:689-698.
  • 7Balenson D,McGrew D A,Sherman A T.Key establishment in large dynamic groups using one-way function trees and amortized Initialization[S].Internet Draft,1999.
  • 8Burmester M,Desmedt Y.A secure and efficient conference key distribution system[C]//Wksp.Theory and Application of Cryptographic Techniques.Springer-Verlag,1995.
  • 9Ateniese G,Steiner M,Tsudik G.New multi-party authentication services and key agreement protocols[J].IEEE JSAC,2000,18(4):628-639.
  • 10Snoeyink J,Suri S,Varghese G.A lower bound for multicast keydistribution[C]//Proceedings of the Conference on Computer Communications(IEEE Infocom),Anchorage,Apr.2001.

二级参考文献15

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献65

同被引文献26

  • 1秦科,周明天,刘乃琦.组播密钥管理方案的新研究[J].计算机应用研究,2006,23(8):142-143. 被引量:1
  • 2IEEE Std 802.11 Wireless LAN Media Access Control(MAC) and Physical Layer(PHY) Specifications[S].1999.
  • 3Arbaugh W A,Shankar N,Wan Y C J,et al.Your 802.11 wireless network has no clothes[J].IEEE Wireless Communication,2002(12): 44-51.
  • 4IEEE Std 802.11i.Wireless medium access control (MAC) and physical layer (PHY) specifications: Medium Access Control (MAC) Security Enhancements[S].2004.
  • 5Wang Yi-ling,Damodaran D,Le P D.Efficient group key management in wireless networks[J].IEEE Information Technology : New Generations, 2006,4( 10/12 ) : 432-439.
  • 6Canetti R,Garay J,Itkis J,et al.Multicast security:a taxonomy and some efficient constructions[C]//Proceedings of the 6th ACM Computer and Communications Security Conference, 1999:93-100.
  • 7Wallner D,Harder E,Agee R.RFC2627 Key management for multicast:issues and architectures[S].IETF, 1999.
  • 8Wong C K,Gouda M,Lam S S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking, 2000,8 ( 1 ) : 16-30.
  • 9Dierks T,Allen C.RFC 2246 The TLS protocol version 1.0[S].IETF 1999.
  • 10王小云.破译MD5、HAVAL-128、MD4和RIPEMD算法的报告[R]∥2004国际密码学会议(Crypto’2004),美国,2004.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部