期刊文献+

基于逻辑密钥树的IEEE802.11i GTK更新方案 被引量:2

IEEE 802.11i GTK update scheme based on improved Logical Key Hierarchy
在线阅读 下载PDF
导出
摘要 针对802.11i标准为了更新组密钥(GTK),需要与每一终端进行二次握手协议,从而加重AP负担,影响组播通信效率。提出一种基于改进逻辑密钥层次方案(Logical Key Hierarchy,LKH)的GTK更新方案,该方案使用组播方式更新组播密钥,且与802.11i标准兼容,同时将GTK更新信息量由O(n)降至Olog(n),可有效运用于无线局域网(WLAN)中。 To update Group Temporal Key(GTK) in 802.11i,2-way handshake needs to carry out for every client,which worsens the overheads of AP.In allusion to this problem,a new GTK update scheme based on improved Logical Key Hierarehy(LKH) is proposed.This scheme,which updates GTK with multicast and reduces overheads from O (n) to O log (n),is compatible with 802.11i,thus it can be good for implement in WLAN.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第10期116-118,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60673041~~
关键词 802.11i标准 更新组密钥 组播 逻辑密钥层次方案 802.11i standard Group Temproal Key(GTK) muhicast Logieal Key Hierarehy(LKH)
  • 相关文献

参考文献10

  • 1IEEE Std 802.11 Wireless LAN Media Access Control(MAC) and Physical Layer(PHY) Specifications[S].1999.
  • 2Arbaugh W A,Shankar N,Wan Y C J,et al.Your 802.11 wireless network has no clothes[J].IEEE Wireless Communication,2002(12): 44-51.
  • 3IEEE Std 802.11i.Wireless medium access control (MAC) and physical layer (PHY) specifications: Medium Access Control (MAC) Security Enhancements[S].2004.
  • 4林林,李学明,陈勇.无线网络中动态组密钥管理方案[J].计算机工程与应用,2007,43(5):133-136. 被引量:3
  • 5Wang Yi-ling,Damodaran D,Le P D.Efficient group key management in wireless networks[J].IEEE Information Technology : New Generations, 2006,4( 10/12 ) : 432-439.
  • 6Canetti R,Garay J,Itkis J,et al.Multicast security:a taxonomy and some efficient constructions[C]//Proceedings of the 6th ACM Computer and Communications Security Conference, 1999:93-100.
  • 7Wallner D,Harder E,Agee R.RFC2627 Key management for multicast:issues and architectures[S].IETF, 1999.
  • 8Wong C K,Gouda M,Lam S S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking, 2000,8 ( 1 ) : 16-30.
  • 9Dierks T,Allen C.RFC 2246 The TLS protocol version 1.0[S].IETF 1999.
  • 10王小云.破译MD5、HAVAL-128、MD4和RIPEMD算法的报告[R]∥2004国际密码学会议(Crypto’2004),美国,2004.

二级参考文献11

  • 1Wong Chung Kei,Gouda M,Lam S S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1).
  • 2Wallner D M,Harder E J,Agee R C.Key management for multicast:issues and architectures RFC 2627[S],1999-06.
  • 3Harney H,Muckenhirn C.Group Key Management Protocol(GKMP)specification RFC 2093[S],1997-07.
  • 4Canetti R,Garay J,Itkis G,et al.Multicast security:a taxonomy and efficient constructions[C]//Proceedings of the Conference on Computer Communications(IEEE Infocom),New York,Mar.1999.
  • 5Chang I.Key management for secure Internet multicast using Boolean function minimization techniques[C]//Proc IEEE INFOCOM'99,Conf Comp Commun,1999,2:689-698.
  • 6Balenson D,McGrew D A,Sherman A T.Key establishment in large dynamic groups using one-way function trees and amortized Initialization[S].Internet Draft,1999.
  • 7Burmester M,Desmedt Y.A secure and efficient conference key distribution system[C]//Wksp.Theory and Application of Cryptographic Techniques.Springer-Verlag,1995.
  • 8Ateniese G,Steiner M,Tsudik G.New multi-party authentication services and key agreement protocols[J].IEEE JSAC,2000,18(4):628-639.
  • 9Snoeyink J,Suri S,Varghese G.A lower bound for multicast keydistribution[C]//Proceedings of the Conference on Computer Communications(IEEE Infocom),Anchorage,Apr.2001.
  • 10Sun Yan,Trappe W,Liu K J R.A scalable multicast key management scheme for heterogeneous wireless networks[J].IEEE/ACM Transactions on Networking,2004,12(4):653-666.

共引文献2

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部