期刊文献+

天地一体化网络节点的移动认证协议设计 被引量:1

Design of Mobile Authentication Protocol among Space-earth Integration Network Nodes
在线阅读 下载PDF
导出
摘要 针对天地一体化网络节点的高速移动和频繁跨域问题,该文基于公钥基础设施框架设计了一套移动认证协议。该协议以公钥密码算法为基础,实现了相邻节点间的匿名认证;利用门限理论将私钥分量分配给n个节点,实现多节点协作认证和权限的动态回收;结合分布式认证与链式认证,实现了分布式的公钥基础设计,为节点高速移动提供了认证基础。该协议体系无中心、自适应、可追踪,符合天地一体化网络的无中心和节点对等等特性。实验表明,与传统的分布式认证相比,该体系具有更强的认证成功率和安全性。 In order to solve the problem of the nodes with a high-speed move and frequent cross-domain in the space-earth integration network nodes,the mobile authentication protocol based on public key infrastructure(PKI) is proposed.Based on the Rivest Shamir Hellman(RSA) algorithm,the protocol realizes the anonymous authentication between neighboring nodes.It distributes the private key components to n nodes according to the threshold theory,and then realizes the multi-node collaboration certification and dynamic permission-recovery.In addition,combining with distributed authentication and chain certification,the protocol achieves distributed PKI and provides certification basis for high-speed move.This protocol frame,which is decentralized,self-adaptive and traceable,can fulfill the quality of the space-earth integration network.Experiments show that the success rate and safety of the system is much better than the traditional distributed certification protocol.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2010年第4期420-424,共5页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60903027) 江苏省“六大人才高峰”资助项目(90718021) 国家省部级专项先期投入基金项目(2010XQTR04) 江苏省公安厅科研项目(2009-10)
关键词 天地一体化 网络节点 门限理论 分布式认证 协议设计 space-earth integration network nodes threshold theory distributed authentication protocol design
  • 相关文献

参考文献8

  • 1Asokan N, Ginzboorg P. Key agreement protocol in Ad Hoc networks [ J]. Computer Communications, 2006, 23(7) : 413 -422.
  • 2Diffie W, Hellman M. New directions in cryptography [ J ]. IEEE Transactions on Information Theory, 2004, 22(6) : 305 -316.
  • 3Balfanz D. Authentication in Ad hoc wireless networks [ A ]. Proceedings of NDSS 2002 Conference [ C ]. New Orieans, LA, USA : American Institute of Aero- nautics and Astronautics, 2002, 1652 - 1671.
  • 4Zhou L, Hass Z. Securing Ad Hoc networks [ J ]. IEEE Network Magazine, 2003, 13(6) : 751 -765.
  • 5庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 6李千目,刘凤玉.战略互联网风险检测与故障分析方法[J].计算机研究与发展,2008,45(10):1718-1723. 被引量:7
  • 7Huang J, Zuo M J, Fang Z. Multi-state consecutive k- out-of-n systems [ J ]. IIE Transactions on Quality and Reliability Engineering, 2003, 16(6) : 527 -554.
  • 8Elena N, Vitaly G, Seppo P. Dynamic reliability indices for k-out-of-n multi-state system[J]. International Symposium on Multiple-Valued Logic, 2005, 19(3): 264 - 269.

二级参考文献7

  • 1李千目,许满武,杨云,张宏,刘凤玉.一种新的网络故障诊断方法——FTFD[J].计算机研究与发展,2005,42(11):1928-1933. 被引量:9
  • 2Skoundrianos E N, Tzafestas S G. Fault diagnosis via local neural networks [J]. Mathematics and Computers in Simulation, 2002, 60(3-5): 169-180
  • 3Rolf Iserman. Process fault detection based on modeling and estimation and knowledge processing--Tutorial paper [J]. Automatic, 1999, 29(4) : 815-835
  • 4Tagliaferri R, Eleuteri A, Meneganti M, et al. Fuzzy minmax neural network: From classification to regression [J]. Soft Computing, 2001, 32(5): 69-76
  • 5Jagannathan R, Neumann P, Javitz H, et al. A realtime fault diagnosis expert system(FDES) [R]. Menlo Park, CA, USA: Computer Science Laboratory, 2002-02
  • 6Tagliaferri R, Eleuteri A, Meneganti M, et al. Fuzzy minmax neural network: From classification to regression [J]. Soft Computing, 2001, 32(5): 69-76
  • 7谭凯军,诸鸿文,顾尚杰.(t,n)阈方案的欺诈识别[J].计算机研究与发展,1999,36(7):853-858. 被引量:13

共引文献31

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部