期刊文献+

Mobile Ad Hoc网络匿名认证协议的研究

Anonymous Authentication Protocol in Mobile Ad hoc Networks
在线阅读 下载PDF
导出
摘要 针对Mobile Ad Hoc网络提出了一个改进的匿名认证协议,主要目的是提供一个隐藏通信节点真实身份的机制,提高对恶意攻击的抵御能力。端到端的匿名认证进行基于对称和非对称密钥加密的三次握手,在成功完成认证过程后,安全的复合匿名数据通道才能被建立。匿名由拥有随机选择伪身份的用户来担保,网络节点公开认证并且独立于用户的伪身份。文章通过一个网络模型介绍了该协议的执行过程,并对其安全性进行了简要分析。 A new anonymous authentication protocol is proposed For Mobile Ad Hoc Networks, the main purpose is to provide the true identity of a hidden node communication mechanism and to improve resilience against malicious attacks. The end-to-end anonymous authentication is conducted in three-pass handshake based on an asymmetric and symmetric key cryptography. After successfully finished authentication phase secure and multiple anonymous data channels are established. The anonymity is guarantied by randomly chosen pseudonyms owned by a user. Nodes of the network are publicly identified and are independent of users' pseudonyms. The article described a network model of the process of implementation of the protocol, and its security is analyzed in brief.
作者 高飞 刘景森 盛明 GAO Fei, LIU Jing-sen, SHENG Ming (1. Computer and Information Engineering of Henan University, Kaifeng 475004, China; 2. Computer Center of Henan University, Kaifeng 475004, China)
出处 《电脑知识与技术》 2010年第7期5181-5183,共3页 Computer Knowledge and Technology
关键词 AD HOC网络 匿名认证协议 分布式信誉系统 对称与非对称密钥加密 网络安全 Ad hoc anonymous authentication protocol distributed reputation system symmetric and asymmetric key cryptography net- work security
  • 相关文献

参考文献8

  • 1Hu Y,Perrig A.A Survey of Secure Wireless Ad Hoc Routing[J].IEEE Security & Privacy,2004,2(3):35-41.
  • 2Yang H,Luo H.Security in Mobile Ad Hoc Networks:Challenges and Solution[J].IEEE Wireless Communications,2004:68-72.
  • 3Zhang Y,Liu W W,Lou W.Anonymous Communications in Mobile Ad Hoc Networks[J].IEEE INFOCOM 2005:143-149.
  • 4Boukerche A.An Efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc network[C].Computer Communications,2004:113-136.
  • 5Kong J,Hong X.ANODR:Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks[J].ACM MobiHoc,2003:77-89.
  • 6Liu J,Issarny V.Enhanced Reputation Mechanism for Mobile Ad Hoc Networks[M].Berlin Heidelberg:Springer-Verlag,2004:48-71.
  • 7Mangipudi K,Katti R,Fu H.Authentication and Key Agreement Protocols Preserving Anonymity[J].IJNS,November,2006,176-181.
  • 8Menezes A J,van Oorschot P C,Vanstone S A.Handbook of Applied Cryptography[M].CRC Press,5th,printing,2001:155-161,183-192.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部